Re: [Int-dir] Intdir telechat review of draft-ietf-bess-evpn-proxy-arp-nd-11
"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 20 January 2021 22:29 UTC
Return-Path: <evyncke@cisco.com>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 963C93A1591; Wed, 20 Jan 2021 14:29:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=e6VbKDir; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=iZsfjsWp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gn39bp6ecvqQ; Wed, 20 Jan 2021 14:28:59 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1A8E3A1590; Wed, 20 Jan 2021 14:28:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=27539; q=dns/txt; s=iport; t=1611181738; x=1612391338; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=vj8MiuSbqbuVHy63frfTRCGqUB3CzRlAkpQDmwvhyF8=; b=e6VbKDirILxI5Bkcl09b6hwoWqfB/XFJg7k1llTITxAv91DkJ7RMpXXa BN7sxAC6w12ImG3aOQyddtOvrkxPaFyCk1L85hf5MhRAfoALwPL764R4r 8lc0jJwHoAqFH8eEvt1QyxuhteiFwZymqXMEG33jxPNZ01g6q5oOh/56k I=;
X-IPAS-Result: A0DFAgBwrQhgmIUNJK1iHQEBAQEJARIBBQUBQIFPgSMBLyMufVsvL4gIA44FA4EFjguKA4FCgREDVAsBAQENAQEYAQoKAgQBAYRKAoF3AiU4EwIDAQEBAwIDAQEBAQUBAQECAQYEFAEBAQEBAQEBhjYMhXMBAQEEAQElGQEBJQYBCwEPAgEILQsOJwslAgQBDQUIE4MLAYF+UgUDLgEOpkQCiiV0gQEzgwUBAQaFCxiCEQMGgTiCdopEJhuBQT+BEUOBWEk1PoJdAQGBGEkFJhKDDoIsgU8KaQZQEAQaMQgUDg0hCyQZPAcBBQcXERQFBkGPT4pZi1SSIwqCd5ZOhTyDKooylRKUG50aAoQ0AgICAgQFAg4BAQaBbSEsgS1wFTuCaVAXAg1XjUoag1eFFIVEdDcCBgEJAQEDCXyLNAEB
IronPort-PHdr: 9a23:VjNy0x3P4nos2hHzsmDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxWGv6dsgUPHG4LB5KEMh+nXtvXmXmoNqdaEvWsZeZNBHxkClY0NngMmDcLEbC+zLPPjYyEgWsgXUlhj8iK6PFRbXsHkaA6arni79zVHHBL5OEJ8Lfj0HYiHicOx2qiy9pTfbh8OiiC6ZOZ5LQ69qkPascxFjA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.79,362,1602547200"; d="scan'208,217";a="671493154"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Jan 2021 22:28:57 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 10KMSvIG029223 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Jan 2021 22:28:57 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 20 Jan 2021 16:28:57 -0600
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Wed, 20 Jan 2021 16:28:56 -0600
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 20 Jan 2021 17:28:56 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iRaIPp5SVtMwEqqJAooxmKJQolT5yUoJ08hk0nWYh9vCvuQLi7NlG3jZG0Y2pQgXHsd8cFWuAKo+GfFiWFx9LOGn6XpSAxK2vdEIYNkHkqYZAFIpjfoje7UqqA9iFBc0uuRvUT6bQVD9uiTOaYg518VcfboLoKRlqd/PNicciT5nio+LfhWHM7vsuGhOeGv10tlPbQm6XDFRnKz3poOhwpYkvopuLTPg4AVmCGCI2Rq2bVDoJGXPvlUg3WohoPk2CV27D2otAer6jqUkaoqmGW3/R/IhMKUkdtpjK7Ger2BRlIWPE9ajoIJsHSTlE5zomgNv6YMgN/ELg/6V5Y32Wg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N8KnJ0u7SHZSH9j8eszwEEFmRp9BCs4H4EPKy6NUyzU=; b=aNDglEubvdGKMcEzbS7LNWENC4jM6d+9Z/kKY0qVuPX+xSd3oJOOB9uCgWHl3fTFZ7XJdcFk6ih1y1HJt3EPABV267a5liup7+gLxlL4rRAjX+4WruFRjpyrtiX0ukTqfignTYYQSomnVh+kxqqV+m08kKLp686qs3kStk/+YMvA4W/sG39KJFe+F340WFCCpc4CxA49spTRsQH03P2rbGzbyYtXfKWFDIormqjgRnkGF1AYi3EiIamYz3yD4a9ZgLcjojcQ//bNwCQhUGyDgtQC9QnPjgEO3diDamO6XKbT5/hNn6wgGpxmtDNanA6UBZnFFtxBMqIUkYoW+lC/ng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N8KnJ0u7SHZSH9j8eszwEEFmRp9BCs4H4EPKy6NUyzU=; b=iZsfjsWp8LTCtqeKyjhIsW+kV8ytEC132aHVteHh/aHqIAU7QFr6FQ27O65DiP71ZI9MwZ8I2EGHVX8YT0wrJ3Fs9hV+8FMgTbOVhFAFUAUzND6UgS7KYmbtr6qIAT0u1nPfCI5xV+faZzf27+W27Kx96mlSQY3SOkUnlpOF/F0=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB4805.namprd11.prod.outlook.com (2603:10b6:510:32::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.12; Wed, 20 Jan 2021 22:28:55 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::7d4c:6b05:89aa:85b]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::7d4c:6b05:89aa:85b%3]) with mapi id 15.20.3763.014; Wed, 20 Jan 2021 22:28:55 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "int-dir@ietf.org" <int-dir@ietf.org>, Jean-Michel Combes <jeanmichel.combes@gmail.com>
CC: "draft-ietf-bess-evpn-proxy-arp-nd.all@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd.all@ietf.org>
Thread-Topic: [Int-dir] Intdir telechat review of draft-ietf-bess-evpn-proxy-arp-nd-11
Thread-Index: AQHW724rg9kaZnVDsEuxtqR0aM35XaoxGBmE
Date: Wed, 20 Jan 2021 22:28:55 +0000
Message-ID: <PH0PR11MB49663A3D92DB5D5A24B41D95A9A20@PH0PR11MB4966.namprd11.prod.outlook.com>
References: <161117591453.11763.14808972528115094239@ietfa.amsl.com>
In-Reply-To: <161117591453.11763.14808972528115094239@ietfa.amsl.com>
Accept-Language: fr-BE, en-US
Content-Language: fr-BE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2001:420:c0c1:36:61b3:36cb:af41:f268]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 36f8a825-0902-49e8-3163-08d8bd92c5b1
x-ms-traffictypediagnostic: PH0PR11MB4805:
x-microsoft-antispam-prvs: <PH0PR11MB4805E7AF9878B30E41067544A9A29@PH0PR11MB4805.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 3KSBiCiW47AVxCb3EI6Q14UaDf0J3qAbT76DFU7Wc83sWJwJnXacU3NEEegtcYo/puvsaOo5YLXIB3OApZhpAhu3a4G3HcyxYVh4hSB7D7Dhz0NwzleIPuNzoOz8Hr/Vh/sNQzwrguG6FjZ6TiE/uYbp4UFq+JFfyxG1Rc9IrtuV1Zl9BOR52HiLzqh9Zgl6fsUlOAAZxabMVWxpMTSwrfcMFq3UI2eFZzj6u227FVjQ+uNTFatAP6bQ4SvxuWSMtq6i58c/A9YWoVOe1T8DxKeHsSZ0Tm+fkgALwqPFU/qDQ82szGMfBG3uapivHsWKJ2O5vdIimERpmHqLr0Di7x0uNr2fTCGYYJcx9JOYtP6kWfHpETkfxK1uQYOFO89hypXWrsZ2W6oDtB+BtmrvOc0XnAGi2MyAzQP6QtxCNNt8dsNerJk9PXH5D5kGHFRQ7l5jpiLcFmNklxP73kqVqA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(366004)(376002)(39860400002)(346002)(396003)(7696005)(166002)(4326008)(8676002)(9686003)(71200400001)(966005)(19627405001)(55016002)(110136005)(66574015)(76116006)(83380400001)(33656002)(52536014)(6506007)(186003)(5660300002)(8936002)(478600001)(316002)(2906002)(66556008)(64756008)(66476007)(66946007)(66446008)(91956017)(86362001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_PH0PR11MB49663A3D92DB5D5A24B41D95A9A20PH0PR11MB4966namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 36f8a825-0902-49e8-3163-08d8bd92c5b1
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jan 2021 22:28:55.1379 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LiXot4SQK0f1mI4dHZALGXT6SdHJtRm6lJmDee+5hDY6sX6qHqrK0XAVb3xID0AObO5ib9kUrlFDJXuJwJcpOA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4805
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/xpj3HZksAIpD60wrL39YoT8WAIk>
Subject: Re: [Int-dir] Intdir telechat review of draft-ietf-bess-evpn-proxy-arp-nd-11
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jan 2021 22:29:02 -0000
Jean-Michel Merci Thanks a lot for the review, I will use it when doing my IESG ballot. This kind of review is really helpful regards Bien à toi -éric ________________________________ De : Int-dir <int-dir-bounces@ietf.org> de la part de Jean-Michel Combes via Datatracker <noreply@ietf.org> Envoyé : mercredi 20 janvier 2021 21:51 À : int-dir@ietf.org <int-dir@ietf.org> Cc : draft-ietf-bess-evpn-proxy-arp-nd.all@ietf.org <draft-ietf-bess-evpn-proxy-arp-nd.all@ietf.org>; bess@ietf.org <bess@ietf.org>; last-call@ietf.org <last-call@ietf.org> Objet : [Int-dir] Intdir telechat review of draft-ietf-bess-evpn-proxy-arp-nd-11 Reviewer: Jean-Michel Combes Review result: Almost Ready Hi, Please find my review, as member of the INT Area Directorate, of the following document: *** GENERAL COMMENT(S)/QUESTION(S) *** o Forwarding a packet I am not aware of EVPN mechanisms: for this review, I am assuming that EVPN allows a PE to forward a packet when the CE owning the MAC destination address and the CE owning the MAC source address are not on the same L2 link. If my assumption is wrong, that should change deeply my review. o State of the art There are no reference to RFC 4349 and RFC 6957, at least. Previous works have been done on “Proxy-ND” and potential issues already analyzed/solved. Please my comments/questions inside: - Section 3.6 - Section 6 *** DEEP REVIEW *** BESS Workgroup J. Rabadan, Ed. Internet-Draft S. Sathappan Updates: 7432 (if approved) K. Nagaraj Intended status: Standards Track G. Hankins Expires: July 11, 2021 Nokia T. King DE-CIX January 7, 2021 Operational Aspects of Proxy-ARP/ND in EVPN Networks draft-ietf-bess-evpn-proxy-arp-nd-11 <snip> 1. Terminology <snip> BCP14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. BUM: Broadcast, Unknown unicast and Multicast layer-2 traffic. BD: Broadcast Domain. ARP: Address Resolution Protocol. GARP: Gratuitous ARP message. ND: Neighbor Discovery Protocol. NS: Neighbor Solicitation message. NA: Neighbor Advertisement. IXP: Internet eXchange Point. IXP-LAN: the IXP's large Broadcast Domain to where Internet routers are connected. DC: Data Center. IP->MAC: an IP address associated to a MAC address. IP->MAC entries are programmed in Proxy-ARP/ND tables and may be of three different types: dynamic, static or EVPN-learned. SN-multicast address: Solicited-Node IPv6 multicast address used by NS messages. NUD: Neighbor Unreachability Detection, as per [RFC4861]. DAD: Duplicate Address Detection, as per [RFC4861]. SLLA: Source Link Layer Address, as per [RFC4861]. TLLA: Target Link Layer Address, as per [RFC4861]. R Flag: Router Flag in NA messages, as per [RFC4861]. O Flag: Override Flag in NA messages, as per [RFC4861]. S Flag: Solicited Flag in NA messages, as per [RFC4861]. RT2: EVPN Route type 2 or EVPN MAC/IP Advertisement route, as per [RFC7432]. MAC or IP DA: MAC or IP Destination Address. MAC or IP SA: MAC or IP Source Address. AS-MAC: Anti-spoofing MAC. LAG: Link Aggregation Group. BD: Broadcast Domain. <JMC> BD is already defined at the beginning of the list. </JMC> <snip> 3. Solution Description <snip> As PE3 learns more and more host entries in the Proxy-ARP/ND table, the flooding of ARP Request messages is reduced and in some cases it can even be suppressed. In a network where most of the participant CEs are not moving between PEs and they advertise their presence with GARPs or unsolicited NA messages, the ARP/ND flooding as well as the unknown unicast flooding can practically be suppressed. In an EVPN- based IXP network, where all the entries are Static, the ARP/ND flooding is in fact totally suppressed. <JMC> IMHO, it is not possible to suppress ALL ND flooding: Duplicate Address Detection (DAD) is remaining, even when the entries are all Static: cf. RFC 4862, Section 5.4. </JMC> The Proxy-ARP/ND function can be structured in six sub-functions or procedures: 1. Learning sub-function 2. Reply sub-function 3. Unicast-forward sub-function 4. Maintenance sub-function 5. Flooding reduction/suppression sub-function 6. Duplicate IP detection sub-function A Proxy-ARP/ND implementation MAY support all those sub-functions or only a subset of them. The following sections describe each individual sub-function. <JMC> No sub-function is mandatory to have “Proxy-ARP/ND” working correctly? If not, please, add text saying which ones MUST be implemented. </JMC> <snip> 3.2. Reply Sub-Function This sub-function will reply to Address Resolution requests/ solicitations upon successful lookup in the Proxy-ARP/ND table for a given IP address. The following considerations should be taken into account: a. When replying to ARP Request or NS messages, the PE SHOULD use the Proxy-ARP/ND entry MAC address as MAC SA. This is RECOMMENDED so that the resolved MAC can be learned in the MAC FIB of potential layer-2 switches sitting between the PE and the CE requesting the Address Resolution. <JMC> What is the IP source address in the NA message? What is the Target link-layer address in the NA message? </JMC> <snip> 3.3. Unicast-forward Sub-Function As discussed in Section 3.2, in some cases the operator may want to 'unicast-forward' certain ARP-Request and NS messages as opposed to reply to them. The operator SHOULD be able to activate this option with one of the following parameters: a. unicast-forward always b. unicast-forward unknown-options If 'unicast-forward always' is enabled, the PE will perform a Proxy- ARP/ND table lookup and in case of a hit, the PE will forward the packet to the owner of the MAC found in the Proxy-ARP/ND table. This is irrespective of the options carried in the ARP/ND packet. This option provides total transparency in the BD and yet reduces the amount of flooding significantly. If 'unicast-forward unknown-options' is enabled, upon a successful Proxy-ARP/ND lookup, the PE will perform a 'unicast-forward' action only if the ARP-Request or NS messages carry unknown options, as explained in Section 3.2. The 'unicast-forward unknown-options' configuration allows the support of new applications using ARP/ND in the BD while still reducing the flooding. <JMC> What happens, for these two options, when there is no hit inside “Proxy-ARP/ND Table”? </JMC> <snip> 3.5. Flooding (to Remote PEs) Reduction/Suppression The Proxy-ARP/ND function implicitly helps reducing the flooding of ARP Request and NS messages to remote PEs in an EVPN network. However, in certain use-cases, the flooding of ARP/NS/NA messages (and even the unknown unicast flooding) to remote PEs can be suppressed completely in an EVPN network. For instance, in an IXP network, since all the participant CEs are well known and will not move to a different PE, the IP->MAC entries may be all provisioned by a management system. Assuming the entries for the CEs are all provisioned on the local PE, a given Proxy-ARP/ND table will only contain static and EVPN-learned entries. In this case, the operator may choose to suppress the flooding of ARP/NS/NA to remote PEs completely. <JMC> Cf. my comment about DAD in section 3. </JMC> <snip> 3.6. Duplicate IP Detection The Proxy-ARP/ND function SHOULD support duplicate IP detection so that ARP/ND-spoofing attacks or duplicate IPs due to human errors can be detected. <JMC> Duplicate Address Detection is mandatory: s/SHOULD/MUST IMHO, it would be useful to add text explaining why RFC 6957 doesn’t solve your issues and so you need to specify a solution “from scratch”. </JMC> <snip> 5.1. All Dynamic Learning In this scenario for minimum security and mitigation, EVPN is deployed in the peering network with the Proxy-ARP/ND function shutdown. PEs do not intercept ARP/ND requests and flood all requests, as in a conventional layer-2 network. <JMC> ND messages are IP based: s/layer-2/layer-3 </JMC> <snip> 6. Security Considerations <snip> The solution also provides protection against Denial Of Service attacks that use ARP/ND-spoofing as a first step. The Duplicate IP Detection and the use of an AS-MAC as explained in Section 3.6 protects the BD against ARP/ND spoofing. <JMC> You are assuming that the attacker and the victim are not on the same L2-Link. Is it always the case in your scenarios (i.e., only P2P links between PE and CE)? If not, IMHO, it would better to: - s/protects/mitigates - Add text explaining when there is a protection and when there is no protection. </JMC> <JMC> I would some text about the fact that your proposal cannot/will not work if there is a (current or future) security mechanism securing ARP/ND exchanges (e.g., SEND) because the PE is not able to secure "proxied" ND messages (i.e., with SEND, the PE is not aware of the security credentials linked to an IP address). </JMC> <snip> Thanks in advance for your replies. Best regards, JMC. _______________________________________________ Int-dir mailing list Int-dir@ietf.org https://www.ietf.org/mailman/listinfo/int-dir
- [Int-dir] Intdir telechat review of draft-ietf-be… Jean-Michel Combes via Datatracker
- Re: [Int-dir] Intdir telechat review of draft-iet… Eric Vyncke (evyncke)
- Re: [Int-dir] Intdir telechat review of draft-iet… Rabadan, Jorge (Nokia - US/Mountain View)