Re: [IPv6] External address discovery (Was: Adoption call for draft-bctb-6man-rfc6296-bis)

mohamed.boucadair@orange.com Fri, 05 April 2024 09:21 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37E81C14F5F3 for <ipv6@ietfa.amsl.com>; Fri, 5 Apr 2024 02:21:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.795
X-Spam-Level:
X-Spam-Status: No, score=-2.795 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQO59YB0Qo5Y for <ipv6@ietfa.amsl.com>; Fri, 5 Apr 2024 02:21:22 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72D68C14F6B5 for <ipv6@ietf.org>; Fri, 5 Apr 2024 02:21:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1712308881; x=1743844881; h=to:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=1aZ/Fz8aBqzKSq/KPNvK6RC2cuEEx5M9kkde44XS3CM=; b=q0grx2o0kagCqTAvGMb1UpPtaMXQATfbJO+blFAJDmIaiDIZAHgyEKY2 v1CITv5XBIUSO1mdcQKaB3jHQ5vFkKk6FDblWbS+fcglVyquBEq9+B1+S UPT4fLK+8vA55kxxpA74H6wdMiwQaOgmkqKdPbVsljnITv+tEwIHUtBq8 brhTcrVuDZwIX34bittE8avEpFVUnP6T2/rfgC5V2IPfLvBUraKPaImLT aoMNMEKX7HdiPaqkha7Ny6vNrYdCn5ZhKf+d+Skz5y64F58u+gcwWOkfP YnrRcig4hq1ydD+tMACQhGFgSAp3qXgF9X/0GXLDxCz9S84VSp4OiJrb6 w==;
Received: from unknown (HELO opfedv3rlp0e.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 11:21:19 +0200
Received: from unknown (HELO opzinddimail4.si.francetelecom.fr) ([x.x.x.x]) by opfedv3rlp0e.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 11:21:19 +0200
Received: from opzinddimail4.si.francetelecom.fr (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id C79C7BC19C7F for <ipv6@ietf.org>; Fri, 5 Apr 2024 11:21:18 +0200 (CEST)
Received: from opzinddimail4.si.francetelecom.fr (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 9A457BC19926 for <ipv6@ietf.org>; Fri, 5 Apr 2024 11:21:18 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail4.si.francetelecom.fr (Postfix) with ESMTPS for <ipv6@ietf.org>; Fri, 5 Apr 2024 11:21:18 +0200 (CEST)
Received: from mail-db3eur04lp2050.outbound.protection.outlook.com (HELO EUR04-DB3-obe.outbound.protection.outlook.com) ([104.47.12.50]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 11:21:17 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by PAWPR02MB10323.eurprd02.prod.outlook.com (2603:10a6:102:366::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.46; Fri, 5 Apr 2024 09:21:12 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02%6]) with mapi id 15.20.7409.042; Fri, 5 Apr 2024 09:21:08 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.106.160.159-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-DB3-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.12.50 as permitted sender) identity=mailfrom; client-ip=104.47.12.50; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-DB3-obe.outbound.protection.outlook.com designates 104.47.12.50 as permitted sender) identity=helo; client-ip=104.47.12.50; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-DB3-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:O+O8mKqlXgbo2sXAbIc7WGU/X45eBmJFYhIvgKrLsJaIsI4StFCzt garIBmBPqyMZ2r0f9Aka9u+o0gG75KByN9qTFRtry1gQyMU9JacVYWSI3mrMnLJJKUvbq7GA +byyDXkBJppJpMJjk71atANlVEliefSAOOU5NfsYkhZXRVjRDoqlSVtkus4hp8AqdWiCmthg /uqyyHkEAHjg2Ec3l48sfrZ9Esz5Kmq4Vv0g3RlDRx1lA6H/5UqJMJHTU2BByOQapVZGOe8W 9HCwNmRlo8O105wYj8Nuu+TnnwiGtY+DyDX4pZlc/HKbix5m8AH+v1T2Mzwy6tgo27hc9hZk L2hvHErIOsjFvWkdO81C3G0H8ziVEFL0OevHJSxjSCc50/pMCPtn/BjN0srJ64K0eVFWGJCx eNNfVjhbjjb7w636J+GcLEww+gJd4zsNo5ZvWx8xzbEC/pgWYrEX6jB+d5f2nE3m9xKGvHdI cEebFKDbjyZO0EJZghRUch4wb/AanrXK1W0rHqQoqo+5mXfigZ2zbPkPNPUYPSNX8xTkUver WXDl4j8KkpDZIHPkmDbmp6qrvPgkCinH4FKL7mT9vx12VeMlkM5WRJDADNXptHi0RTiBLqzM Xc8/TY0qqE03EGuVt36ThC1uziDpBF0c9tIDbMS6QyRxOzT+QnxO4QfZjtIadhjuMVtSCEwj gONh4mxWGQpt6CJQ3WA8LvStSm1JSUeMW4FY2kDUBcB5N7g5oo0i3ojU+qPDoa3oZ6tGG31z guAsTIdlZ4Qv5cI25WkqAWvby2XmrDFSQs85wPyV22j7x9kaIPNW2BOwQiKhRqnBNbIJmRtr EQ5d96iAPcmLLzlqcBgaOAEHbXs6/zePSDG2QJrB8N5qmzr/GO/d4dN5j04PF1uLssPZT7uZ gnUpB9V45hQenCtaMebgr5d6ex7lsAM9vy8DZg4i+aihLAvKWdrGwkwOCatM5jFyhRErE3GE c7znTyQJXgbE7976zG9Wv0Q17QmrghnmjqJH82mk0r6iuHDDJJwdVvjGArWBgzexPLcyDg5D /4Dbpbao/mieLGgPXWModZDRbz0BSFhWsyr96S7idJv0iI9Qzt9VJc9MJskeod/mL9SmPuA9 XanQidlJKnX1BX6xfGxQik7MtvHBM4hxVpiZHBEFQjyhxALP930hI9BLMRfQFXS3Lc/pRKCZ 6JYI5no7zUmYmivxgnxmrGk8dwyK0jw2l3WV8dnCRBmF6Ndq8Xy0oeMVmPSGOMmV0JbaeNWT 3ycOgLnrV4rajlYVJqTRNj0ilS7sD4ahf54WFbOLp9LYkLw/YN2Kiv3yPgqP8ULLhaFzTyfv +pTKQlNvvHD+ufZ7/GQ7Z1oba/xewe9IqaeN27B5LC5OG/R+W/LLUpoTrOTZT6EPI/r0PnKW Ni5F83BDcA=
IronPort-HdrOrdr: A9a23:iptAMagPQBM4EFete+fWAv8rhXBQXucji2hC6mlwRA09TyXPrb HJoB17726XtN5yMEtLpTnuAsS9qB/nmaKdgrNhXotKPjOGhILyFvAE0WKK+VSJcBEWkNQz6U 4KSchD4bPLY2STIqzBkXCF+3pL+qjjzEgI792uq0tQcQ==
X-Talos-CUID: 9a23:Yva6HGMYf0eube5DWgYkrE9IH80eeGDH72X7IH3hCmpZV+jA
X-Talos-MUID: 9a23:Tu4BJw4JPbCcgST6J67WmZzBxox0zKmlVAcOya4CkMmGKnV6JGeypmW4F9o=
X-IronPort-AV: E=Sophos;i="6.07,181,1708383600"; d="scan'208";a="31858326"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UYz5JIGDoqTmQ2qa6NUuDzmOCfS+V0x8dJ1KWHJsK4vG66uWj2ozd1bTBG/12NTGxG2zYT4wNKlf16wWZxJwKSBLbf8g+0MpR79lahMqzvxQxy5t4T+zrJpOKntoxOJt+tywJWIC837O1ftvRQj5CGaUPxzlQG7OhAtEBhgNGl6DwslPROLGc63iHXqqAiLlVaMZoGg5T3p6DUfqvppDsYa48a1s+GsY71NKn9gRSneIFQC9lcCSqiBDU7CoOJLprRQVAQ3/ATJ5pvFqevkNQb/GpIXZVy1YpQJeZGL1aGW520UnENJymw3w5xE28uWLesmA/Yll9Isma8XnGl5+fg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1YklIfUmlTatwsKTczITApI5EzKHNsUYxj+b4xMD3Y0=; b=aQZbBmTDAuPowpMbB/y626rnkhdWpTtFCvQqfnUWyaRoXnxbGXMRvMlVG0wQawP6p5BaDrEnyLksE7s8cq4A/T5sGBntK81K25LsWpDAxzqVwhg5Z9Hb+fNONZrUUhnoEBYnjI4FCI4XNeBwd23Dwnt/igGE5smXCqardyLtTJDOKZiS4h2pfadmBnmq3tdiZRQ4o1EjAYy0lzja8QaHWX7MXTqlQnKBhcvcSZFRxucC2xYCi/btq8kRNFazdfKo9sQKe2sr7sv7hr0VymQX8tqP8urx0fJpo+w6lgMfYEJx4kT2aY9PpgCnWtlEyuT0mBixOQBsqf566SzkD5wjpw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Ole Troan <otroan@employees.org>, 6man WG <ipv6@ietf.org>
Thread-Topic: External address discovery (Was: [IPv6] Adoption call for draft-bctb-6man-rfc6296-bis)
Thread-Index: AQHahyvEdcnKO1JlE0ektxGqi8UvS7FZWN6Q
Date: Fri, 05 Apr 2024 09:21:08 +0000
Message-ID: <DU2PR02MB10160983E999A1FA08794418488032@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <DU2PR02MB101602B1AAFD37A67062929A9883E2@DU2PR02MB10160.eurprd02.prod.outlook.com> <7C42726A-2320-48E6-A61F-D54E19DFC9A9@employees.org> <DU2PR02MB101609872B036CAA21597D71B883E2@DU2PR02MB10160.eurprd02.prod.outlook.com> <4AB7CD35-704C-4DFA-9346-5F93E0FAD6E8@employees.org> <DU2PR02MB10160C85B157A1B53D107DDBD883E2@DU2PR02MB10160.eurprd02.prod.outlook.com> <A0507077-0DB7-4D6B-B42B-12D2833049AB@employees.org>
In-Reply-To: <A0507077-0DB7-4D6B-B42B-12D2833049AB@employees.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=db36245f-2bf6-4714-8a05-8957bc22ddcf; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-05T08:35:47Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=0; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|PAWPR02MB10323:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(366007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: f/7ySNeLX+hBZCmqJ3gtYI3kqcEbpO6qO8yh8eOvQjA1NDHYbaKMjaLarN4sHSTTJpdQ/EDFUY4Zlglfl0klgRYqY7PvzbL0CfbejsjhvJEk1Mc9IHWu24XcddltyIu+B6vDamLxXjvGDg2v76XRwLn9Yhl4GuEhF1wSUrq4ncBK8QAE7A5AGmvLP6u+ixCkBDTMwFeSCjfUzGtzE9+Ox32AAVoYHI7yXOfU+NtP30K60Q7OW5hrWGvwlblUSvT/N7puBsss6nla+8thvAT7Ugf6L+5NfngkeXq/8s3D+3vsoaOOFEjuuD0UfLwcSl56lIV/Ge5vPXET+38h1JQY266z+GGMwkKR/TmGxEjbmODIdUrywG5CbxnvnsPCc7WuNXet1pygijuQe9/BRScPDne6LrLr4r38cBInYG9BXhWjCMtzfig32LLMopkiro+DwTjJofKsnbrr3kukjBuZ+XDGDNUwz27eMT3U8bgkUMT684XRXXc2k6OG6Y0C/JBIUGu0/56lkrSd9Y3v4TaUA2xeuc2yu70bt3Df451DyuU9LxaXJ9PbiY07pMEOdUkTjJzK6qoYD8Pp7iTNbQ5W+5vB/qyJGHANAzvDHnkqozQDBE2DAjW++XwPhUm9XNkPLNfsY+gUgWAOTIw3TJW49ROjPqXzhonZ+J3gLrP+BeI3sdRSCCVm1ZArXZojtLiNGJ8XATSjRnM50gfqAtvx5ZpL34N3FCrAe8yLEUIsHXh/YfzYFT5m/2jj3OOOlZ8bUqgRLTXMo2OpnAcoFck5Deh7loW0oe7wiU+u0ZuOBHoSiYWSu2Q9ffgaKkV8V/XXIWzYV4fpug9DzCVWZv7X6P2rnWM9fq8btPjWO2k37pFvLRi7RPsiWIN3fj+KT+4v+lpJxV3oaCWissp6pfa69dsS4cXz7lE3hVEUvaX4BSEjJQpEah5FtlXti/Z6t9Lctiv0yvzx1EQ9eTG8uWAOxKZWfr6jZPFue3b7bprvBTUltIZrok+dOcN1d3ejvaWaW0j4wrXvL41jO1kHQcDqjwkvqPke3UeZeYldjzLXwUgASf9TriwAPI2iU/hwc1hKfFXGlZ8QtOps/BtgpERzl3aW5g/I5gTXTtInshulJjheTM4WQVA5/1prDGG4djoWpCT82jGpe+CyDwWtbDXgWBcqwc7IyuCWqTx663copcz/iH1Fmq5u+DUYwlV7ufi3jsrJ0OjCcP4sS8jxg48su/rB3AzZOZHxzhq8/3bBhtxDH4mCtrrvejTz1IehsTft/OdhyAafslpnpv9ntl/yW0TxmtIkF5n4F5hWdH2nh2kYDCUucHr51Yi6lcle+G6DF0cBpyv4lwUnaxb6lKnN5RUl5GtPVpr1S07r0lT8sSL/+729H0fwnU6GVpfq2jppfipCsxa608AnWqVEST4k/D/gK9IWD1/04eeAqkkU7bdKMe8bAxMrf3/bF8wIarGuBGTK8Q1/xLKtoBMWbgTYTO/BMHLIz5xJnn1Oc9I5/aKvkXSuH5pc0Wu3EuTbB9dqwGIqHsNDKfp7HRzgIrNyPNYGuYkwgNXOMI6DEZoUHcVwxxD7ql2pqXrmJbTxtlz3i36OZN+Ri/HdH58sHC6wXA==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6fd1fd78-b67b-4df7-614a-08dc5551ba08
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Apr 2024 09:21:08.1496 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mahxOqg3XJ9KekESXwcrg1i4dEIdsUdfn9e7ixe3V038YlCw8ihHgMkrHqzAUfkOl2g6CViOHHDieAt23Z9R9L5+d9CYnxKjufPKj4N+6pc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR02MB10323
X-TM-AS-ERS: 10.106.160.159-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-28298.006
X-TMASE-Result: 10--49.390100-10.000000
X-TMASE-MatchedRID: 3h4u+WloBRTbKhq8VEUqMQ/mZiNGOYHfvHKClHGjjr1NLPQl0QAltEOg o9xF1gRN32pXVHMwaheunJ7G0FIja3dlVxsnLQfuFEtCcPqmM8/mu6GrtSORD29OLiEGcnHNAXK f3SvSkWjL9LJ0j3xlqVzW/eT3Ah4KWG5gPqvGhcaq4Yzi/atV+5Ak4Vz6rKorMaP9SSz/VBnHR1 EJPNbRdiYiaX7LCuq+HT9iIIGMqIY0GaZO0xs/uUabKAwppBdS1PhYGbtK4A6bQfYveSNCCn0Ej OOM/PN6buUFf/ftHikjpW9U1vcqtQxA9YmorBBDEo1wGbGljGX+xRIVoKNMvFtVYx4c55lowj10 jtt9j+/T/FtLf6zGlJE4gyeoUoW7g9j6rdGO3ufMNQS4qTI4dG9bkQtHwoDqkYC3rjkUXRK3Stk 62MqiCC1sQGcqD7UtrJhKLl9HiwJu0tJ1eKYMQ2463byk9FRijhXy0Khej9K8sFdsyxklvkJsNX D374+pCnU94sbaNfioVlIekwwvGcznvqg00LZwhNdBj8gxseJtN2GsBybzwln4Ir4HFD2TbNi6X 5rRknTvjhgeV9O8lIgJUGdhJUsFJgV4DKZfB16kpm87KqZ5R0NF5tKVli5KyeUl7aCTy8gD2A3c kpvl9x9sSF9fYJNfR1zqPI28vEDpClV+j40GO/kbfiFLQVp+BDoR8w7C9ObkRE2h9ncEXFc/Ced jlcvk9XakwGPV8/FduBPNrkB2BP8oQTHwd4/aW1Zeku660tMF7cpFXK76TTM2xdYG8ZUGo/d1sK sSKKBErssMQdxI5E+3aK/n3aBpgdBGWYdVicaXBXaJoB9JZ8BX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xfmS+aPr0Ve8SlnU38LCY8v0EiGJMN85zd0H8LFZNFG7/nnwJ52QYi+pygCGKFPC+BeYl5uS 2QAg
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-HyI0eQU7XHERgg01l1vckX-lMY>
Subject: Re: [IPv6] External address discovery (Was: Adoption call for draft-bctb-6man-rfc6296-bis)
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Apr 2024 09:21:27 -0000

Hi Ole,

Please see some comments inline.

Cheers,
Med

> -----Message d'origine-----
> De : Ole Troan <otroan@employees.org>
> Envoyé : vendredi 5 avril 2024 09:34
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; 6man
> WG <ipv6@ietf.org>
> Objet : Re: External address discovery (Was: [IPv6] Adoption call for
> draft-bctb-6man-rfc6296-bis)
> 
> 
> If we use an application like an SSH server as an example:
> 
> Connection methods:
> 
> 1. Native IPv6.
>    Listen to all its non-temporary addresses including ULA
>    Register GUA in DNS. Only GUA or ULA too?
>    Detect addressing changes dynamically
> 
> 2. Native IPv6 behind stateful firewall
>    Same as above
>    Detect that there is a firewall, and register its addresses/ports
> using PCP
>    Detect changes in fw binding.
> 
> 3. IPv6 behind NAT64
>    Detect that it sits behind NAT64? How?

[Med] Use heuristic such as rfc7050 or an explicit mode for a given instance using RFC7225. 

As you have a "no ALG reco" in current NPTv6 text, please see https://datatracker.ietf.org/doc/html/rfc7225#section-5.2 to explain how this is possible without breaking applications.

>    PCP to register inside address/port.
>    Deal with both address changes and binding changes (e.g. NAT64
> device restart)
> 
> 4. IPv6 behind NPTv6
>    Same as #1, but detect outside address using DNS, HTTP, PCP?
>    Detect outside prefix changes
> 
> 5. Behind NAT66 1:1
>    Similar to #4.
> 
> 6. Behind NAPT66
>    Similar to #3 / IPv4 NAPT
> 
> A peer to peer application like video conferencing would in addition,
> instead of registering in DNS, register with some other directory
> service?

[Med] See also RFC7393 for dynamic DNS interactions.

> And require ICE/STUN for firewall traversal in addition to PCP?
> 
> 
> Did I miss anything?
> For an application to work in all cases, it has to work with something
> having session state.
> External address discovery / registration is a little different, but
> looks like PCP is the common denominator.
> So even if NPTv6 itself could get away with a much simpler mechanism,
> perhaps it would make sense to require that for all IPv6
> applications...
> 
> 
> Cheers,
> Ole
> 
> 
> > On 2 Apr 2024, at 14:48, mohamed.boucadair@orange.com wrote:
> >
> > Re-,
> >
> > There is no need for explicit configuration for typical LAN topo.
> The rule is that the default router(s) will be assumed as the PCP
> server, unless servers are explicitly configured (RFC7291). Clients
> may also use the anycast address 2001:1::1/128 for discovery.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Ole Troan <otroan@employees.org> Envoyé : mardi 2 avril 2024
> >> 14:31 À : BOUCADAIR Mohamed INNOV/NET
> <mohamed.boucadair@orange.com>
> >> Cc : Ted Lemon <mellon@fugue.com>; Brian E Carpenter
> >> <brian.e.carpenter@gmail.com>; 6man WG <ipv6@ietf.org> Objet :
> >> External address discovery (Was: [IPv6] Adoption call for
> >> draft-bctb-6man-rfc6296-bis)
> >>
> >> Hi Med,
> >>
> >> Thanks for that!
> >> PCP; does that require some sort of PCP server discovery?
> >> Or can one send a packet to e.g. the intended destination following
> >> the default route?
> >>
> >> Best regards,
> >> Ole
> >>
> >>
> >>> On 2 Apr 2024, at 13:55, mohamed.boucadair@orange.com wrote:
> >>>
> >>> Hi Ole,
> >>> Please see inline.
> >>> Cheers,
> >>> Med
> >>> De : Ole Trøan <otroan@employees.org> Envoyé : mardi 2 avril 2024
> >>> 12:29 À : BOUCADAIR Mohamed INNOV/NET
> <mohamed.boucadair@orange.com>
> >>> Cc : Ted Lemon <mellon@fugue.com>; Brian E Carpenter
> >>> <brian.e.carpenter@gmail.com>; 6man WG <ipv6@ietf.org> Objet : Re:
> >> [IPv6] Adoption call for draft-bctb-6man-rfc6296-bis
> >>>  An additional point is the “traversal “ point.
> >>> Ie how should the node on the inside discover its outside address.
> >>> [Med] This can be done by sending a MAP request such as:
> >>>    Version: 2
> >>>   R bit: Request (0)
> >>>   opcode: MAP (0x01)
> >>>   Requested Lifetime: 36000 sec
> >>>   PCP client's IP Address: fd01:203:405:1::1234
> >>>   MAP Request:
> >>>    Mapping Nonce: 15685
> >>>    Protocol: 0
> >>>    Internal Port: 0
> >>>    Suggested External Port: 0
> >>>    Suggested External IP Address: ::
> >>> And get a response like the following:
> >>>    Version: 2
> >>>   R bit: Response (1)
> >>>   opcode: MAP (0x01)
> >>>   Result Code: 0
> >>>   Lifetime: 36000 sec
> >>>   Epoch Time: 1250
> >>>   MAP Response:
> >>>    Mapping Nonce: 15685
> >>>    Protocol: 0
> >>>    Internal Port: 0
> >>>    Assigned External Port: 0
> >>>     Assigned External IP Address: 2001:db8:1:D550::1234  Another
> >>> approach to discover the external address is to use a
> >> short-lived request against “discard service” (udp/9):
> >>> ==
> >>> Version: 2
> >>> R bit: Request (0)
> >>> Opcode: MAP (0x01)
> >>> Requested Lifetime: 5 sec
> >>> PCP Client's IP Address: fd01:203:405:1::1234 MAP Request:
> >>> Protocol: UDP (17)
> >>> Internal Port: 9
> >>> Suggested External Port: 9
> >>> Suggested External IP Address: ::
> >>> ==
> >>>  And also should there be any signalling to the node to indicate
> >> that it sits behind an NPTv6 instance.
> >>> [Med] That was the spirit of draft-boucadair-pcp-capability as an
> >> IPv6 host can sit behind an IPv6 firewall, NAT64 or NPTv6. But
> that’s
> >> not mandatory given that  the client can build two requests: one
> with
> >> “Suggested External IP Address: ::” (NPTv6/IPv6FW) and another one
> >> with “Suggested External IP Address: ::ffff:0.0.0.0” + PREFIX64
> >> (RFC7225) for NAT64. The client can infer the type of the
> controlled
> >> device based on the response it will get.
> >>> Cheers
> >>> Ole
> >>>
> >>>
> >>> On 2 Apr 2024, at 10:28, mohamed.boucadair@orange.com wrote:
> >>>  Hi Ted, all,
> >>> On the PCP point, I confirm that the spec supports NPTv6
> >> (protocol=0, internal port=0).
> >>>                  internal  external  PCP remote peer  actual
> remote
> >> peer
> >>>                 --------  -------   ---------------  -------------
> -
> >> ----
> >>>   IPv4 firewall   IPv4      IPv4         IPv4              IPv4
> >>>   IPv6 firewall   IPv6      IPv6         IPv6              IPv6
> >>>           NAT44   IPv4      IPv4         IPv4              IPv4
> >>>           NAT46   IPv4      IPv6         IPv4              IPv6
> >>>           NAT64   IPv6      IPv4         IPv6              IPv4
> >>>           NPTv6   IPv6      IPv6         IPv6              IPv6
> >>>                Figure 5: Address Families with MAP and PEER Note
> >>> that some optimization were made in the past to help building
> >> PCP requests as a function of the PCP-controlled device: draft-
> >> boucadair-pcp-capability (CAPABILITY Option) and  draft-cheshire-
> pcp-
> >> unsupp-family (UNSUPP_FAMILY Error), but were not adopted by the WG
> >> at the time. See also slide#5
> >>
> ofhttps://https://eur03.safelinks.protection.outlook.com/?url=http%3A
> >> %
> >> 2F%2Fwww.ietf.org%2Fproceedings%2F83%2Fslides%2Fslides-83-pcp-
> >>
> 3.pdf&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C4d62f7af67844de
> >> 7
> >>
> b14708dc5310dfbb%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6384765
> >> 8
> >>
> 0692628083%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz
> >> I
> >>
> iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=h6LSXlEeYchiMAdIoi
> >> P APnxKtu55tf05bhvzbtiyMj0%3D&reserved=0.
> >>> Cheers,
> >>> Med
> >>> De : ipv6 <ipv6-bounces@ietf.org> De la part de Ted Lemon Envoyé :
> >>> jeudi 28 mars 2024 20:43 À : Brian E Carpenter
> >>> <brian.e.carpenter@gmail.com> Cc : 6man WG <ipv6@ietf.org> Objet :
> >>> Re: [IPv6] Adoption call for draft-bctb-6man-rfc6296-bis  Part of
> >>> the problem here is that the camel's nose is sticking
> >> under the tend and we have to ask ourselves if we really want the
> >> camel in the tent. Clearly if NPTv6 is operational on a network,
> and
> >> we want devices on the network to be able to set up listeners, then
> >> we may need extensions to PCP to make that work. Or possibly PCP
> >> already does what we need—I'm not sure. But if we need to extend
> PCP,
> >> now
> >> NPTv6 is being further legitimized by yet another bit of standards
> >> work done to support it.
> >>> This isn't a problem if this is a niche solution that doesn't
> >> impact most general use cases, but if we standardize it and it
> starts
> >> seeing wider deployment, now we're stuck having to do more protocol
> >> work to support it. IMO this is a bad outcome.
> >>> One of the things that worries me about this is that there is
> >> always an economic tension between peer-to-peer and client-server.
> >> Toll collection is a lot easier for the client-server case than for
> >> the peer-to-peer case. And so there is a clear economic incentive
> to
> >> create solutions that make peer-to-peer impossible. You may have
> >> heard the term "over the top" used by ISPs. I always found this
> >> scandalous— this is the ISP saying "I want to collect a toll from
> the
> >> provider of a service on top of the money I'm charging for the
> >> service I'm actually providing, simply because I'm on-path and so I
> >> can." To me this is security issue, which the IETF should be
> working
> >> to prevent, not to facilitate.
> >>> Of course this is completely orthogonal to the stated use case,
> and
> >> I am not suggesting that the proponents of the stated use case here
> >> at the IETF are secretly plotting to block over-the-top services.
> >> Really I am not. But that's one of the things that this standard
> will
> >> do, and if you are getting pressure to do this from people who
> can't
> >> state a clear use case, you might want to ask yourself what /their/
> >> motivation is.
> >>> On Thu, Mar 28, 2024 at 2:36 PM Brian E Carpenter
> >> <brian.e.carpenter@gmail.com> wrote:
> >>> On 29-Mar-24 06:02, Nick Buraglio wrote:
> >>>>
> >>>>
> >>>> On Thu, Mar 28, 2024 at 9:45 AM Nick Buraglio
> >> <buraglio@forwardingplane.net<mailto:buraglio@forwardingplane.net>>
> >> wrote:
> >>>
> >>> <snip>
> >>>
> >>>>>>>>
> >>>>>>>> The benefit of NAT class mechanisms, is that cost and
> >> benefit are aligned. Only one side needs to deploy it.
> >>>>>>>
> >>>>>>>
> >>>>>>> Actually, the benefit of NAT class mechanisms is that one
> >> party deploys them and another party incurs the costs. NAT is great
> >> for the network operator, because it moves a number of problems out
> >> of the network operator's domain. But it doesn't do that by solving
> >> the problem, it does so by making the application's job more
> difficult.
> >>>>>>
> >>>>>>
> >>>>>> I don't think that is typically true.
> >>>>>
> >>>>>
> >>>>> For client/server applications, where the client is on the
> >> inside of the NAT with a private address, and the server is on the
> >> outside with a public address, that wouldn't be typically true.
> >>>>>
> >>>>> However, for applications where the communications model is
> >> peer-to-peer, or a mix of client/server and peer-to-peer, the
> >> application developer has to implement RFC 8445 ICE using STUN and
> >> TURN for NAT traversal, incurring additional development, debugging
> >> and testing costs.
> >>>>
> >>>>    Is that still accurate for a device behind NPTv6? RFC3235
> >> section 3.1.5 points out that statically configured NAT bindings
> are
> >> largely exempt from the problems of port mapping, and NPTv6 is only
> a
> >> non-stateful translation that does not require the transport header
> >> to be re-written, simply translating the first 64 bits, so unless
> the
> >> communication embeds an address, which is problematic for all of
> the
> >> obvious reasons we see with things like legacy FTP, the peer-to-
> peer
> >> applications should work - assuming no security policy is in place
> to
> >> prevent it.  In fact, vendor documentation specifically calls out
> one
> >> of the advantages of NPTv6 as keeping peer-to-peer networking
> >> accessible:
> >>>>
> >>>>    /The NPTv6 support allows you to redirect or forward packets
> >> from one network to another in an IPV6 environment. The NPTv6
> support
> >> on is an algorithmic translation function which provides a 1:1
> >> relationship between the addresses within the inside and outside
> >> network. When NTPv6 is used, you can interconnect different
> networks
> >> and support multihoming, load balancing, peer-to-peer networking.
> The
> >> NPTv6 does not create any state in the data plane and hence can
> >> operate using minimal memory and also supports high availability by
> >> default./
> >>>>
> >>>>    Of course, it's vendor documentation so take it with a grain
> >> of salt, but I would not expect that to remain in published
> >> documentation unless it actually had some validity.
> >>>>
> >>>>>
> >>>>> Alternatively the application developer adopts a
> >> client/server communications model for the application, even though
> a
> >> peer-to-peer model would be more scalable and more robust against a
> >> centralised server failure and server performance problems.
> >>>>>
> >>>>> This is why I say that NAT (of any type) imposes a default
> >> client (inside NAT) /server (outside NAT) communications model at
> the
> >> IPv4 or IPv6 network layers, rather than the default peer-to-peer
> >> model that can then accommodate both client/server and peer-to-peer
> >> applications communications models.
> >>>>>
> >>>>> NPTv6 may be stateless, however since hosts behind the
> >> NPTv6 will have to discover their public addresses via ICE if they
> >> want to be peers, NPTv6 still imposes those ICE costs on
> application
> >> developers and the applications' end-users.
> >>>>
> >>>>    Do they need to discover that? If the mapping is 1:1 it is
> >> functionally the same address unless there is an embedded address
> in
> >> the protocol communications, right? Or am I missing something
> obvious?
> >>>>
> >>>>
> >>>> I talked to some developer friends that helped me understand this
> >> a bit better, thanks for giving me the terms to build from to dig
> >> deeper. Specifically, the need for determining the actual address
> for
> >> a peer to peer application is required because there may be peers
> >> both inside and outside of the translation boundary and a given
> >> application needs to know what those are in order to avoid things
> >> like tromboning traffic or blackholing connectivity. This makes
> much
> >> more sense now that I have had someone walk me through it.
> >>>> My question back which I think is still a valid question and is
> >> couched in a dichotomy of ideal vs pragmatic debate is "does this
> >> extra work implementing the overhead of the ICE/STUN/TURN impose
> >> significant overhead compared to existing application development
> >> requirements to support how networks work on average today?"
> >>>> I am not knowledgeable enough to answer that question. At face
> >> value it *seems* that there will be a need to support these tools
> >> (ICE/STUN/TURN) already in order to support port address
> translation
> >> that is likely required for the foreseeable future for environments
> >> that are devoid of public addressing and are behind some kind of a
> >> port address translation device for v4. And, how does that map into
> a
> >> NPTv6 deployment using one of the specific use cases? Does the lack
> >> of state make that easier or harder or make no difference?
> >>>> Myself and others have pointed out very clear and very specific
> >> use cases where NPTv6 solves a real operational problem, and has
> been
> >> in operation for quite some time.
> >>>>
> >>>> As an aside, I don't think we should "what if" about ISPs
> >> deploying NPTv6 at their edges or all home users insisting on using
> >> it as they are functionally forced to do with NAPT, those use cases
> >> for NAPT are a forced function caused be a problem we don't
> currently
> >> have (address exhaustion) and any guessing about exploding use is
> all
> >> speculation. Operators are going to do what they are going to do,
> but
> >> what we could do is be very clear about the problems that this
> >> solves, and the places where it does not add value and is
> discouraged.
> >>>
> >>> Which is exactly why changing NPTv6 from experimental to
> >> informational status, with information added about which scenarios
> >> this assists and which scenarios it damages, based on experience,
> is
> >> the right thing to do.
> >>>
> >>>     Brian
> >>>
> >>>>
> >>>>
> >>>>>
> >>>>> Network engineers who deploy NATs aren't directly exposed
> >> to or pay any of these additional application development costs
> >> (other than when they're the application users), which is why it
> >> appears that NAT is a simple and low impact technology to deploy.
> >>>>
> >>>>    Given that nearly every application must be written to support
> >> dual-stack, and therefore must implement these techniques for port
> >> address translation, is that cost not already incurred by default?
> I
> >> understand that it may take some work to add IPv6 support to
> >> applications that require ICE/STUN/TURN, however, assuming (and
> >> that's a big assumption on my part), that the 1:1 stateless nature
> of
> >> NPTv6 and a lack of an embedded address, what is the surface area
> of
> >> applications that need to incur that cost specifically for IPv6
> where
> >> it does not currently exist?
> >>>>    Is it 90% of applications? Is is 10%? I don't actually know
> >> but would like to. Likelihood of occurrence is a key in making
> design
> >> decisions, at least in my world.
> >>>>
> >>>>    I fully admit that I am not an application developer, and
> >> there are undoubtedly aspects here that I do not understand, so
> >> pardon my potentially basic questions - I simply don't have the
> >> background but would like to fully understand. Knowing the
> likelihood
> >> and actual need at an application level where it does not already
> >> exist as part of a normal development workflow to support existing
> >> environments, and specifically where it is required where NPTv6 is
> a
> >> valid design model would be very, very useful, especially with the
> >> use cases for NPTv6 being fairly specific.
> >>>>
> >>>>>
> >>>>> Regards,
> >>>>> Mark.
> >>>>>
> >>>>>>
> >>>>>> I will definitely say from experience that there is a
> >> significant operational cost to deploying any translation tool, and
> >> more so when there is active state tracking and overload involved.
> >> There are often (but not always) logging requirements to do these
> >> things at scale, and there are definitely operational costs in
> >> dealing with state table tracking and scaling. These don't exist at
> >> the same level for mechanisms that do not track state and that do
> not
> >> masquerade using port address translation. They may still incur
> >> application cost, or they may not, that is always going to be based
> >> on the application stack and is more likely in real time
> applications
> >> that don't use a third party intermediary, as you have stated.
> >>>>>>
> >>>>>> There are similarities in the translation toolkits, yes,
> >> they all perform translation at some level. However, what is
> >> generally referred to as "NAT" in the general term is typically PAT
> >> or NAPT or Masquerading, depending on the nomenclature. That said,
> >> *because* it is significantly easier to deploy NAPT, I do not
> believe
> >> that it is an apples to apples comparison. They're all tools in the
> "translation"
> >> category, but they're definitely not all created equally. NPTv6
> does
> >> a
> >> 1:1 translation, the NAT that folks seem to be referencing in the
> >> IPv4 world does not, and I do not believe it is a reasonable
> comparison.
> >> It's a far better comparison to say that NPTv6 is like a
> traditional
> >> one-to-one NAT (which does still have notable, albeit significantly
> >> fewer considerations, which I believe are noted in the draft).
> >>>>>>
> >>>>>>
> >>>>>> nb
> >>>>>>
> >>>>>> ----------------------------------------------------------
> >> ----------
> >>>>>>>
> >>>>>>> IETF IPv6 working group mailing list ipv6@ietf.org
> >>>>>>> <mailto:ipv6@ietf.org> Administrative Requests:
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9897697%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=4F8WgZJRS3bgjsr5H4SsLg
> 8zph%2BQtDYY8T1ngi6gpxA%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692642374%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=OXHoSqggAvT9Cr8sq4PbYAXmk0yuydXuU9XWvmG8fUY%3D&reserved=0
> >> <
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9909603%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=oGtnKT5EOwQX%2FA6sZdNZ
> oc5G79VxDcKQpWEAYU9jVHA%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692654312%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=wVrVT%2FwCrT0JegUypbCDTPKVsJzPvWecKGVfQGLFcII%3D&reserved
> >> =
> >> 0>
> >>>>>>> ---------------------------------------------------------
> >> -----------
> >>>>>>
> >>>>>> ----------------------------------------------------------
> >> ----------
> >>>>>> IETF IPv6 working group mailing list ipv6@ietf.org
> >>>>>> <mailto:ipv6@ietf.org> Administrative Requests:
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9918343%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=Ywa8Rc5lJpEHVbjyMDl81T
> Rv8c6JYGecf2z53dJ1D9M%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692664436%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=WlN6zC1VFdXYTAsdVbsuzUTkUGXaHOFqSYAeR2k50Ec%3D&reserved=0
> >> <
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9924912%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=qql1zRHJ3rvkCrntOIKWf8
> cBguYgxkZ9S9I4MYPvpOk%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692675683%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=fHqsEjQXalPL6rn6g1QrbuQKo2A2pHk1pJGXeBP0NOQ%3D&reserved=0
> >> >
> >>>>>> ----------------------------------------------------------
> >> ----------
> >>>>
> >>>>
> >>>> -----------------------------------------------------------------
> -
> >> --
> >>>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>>> Requests:
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9932121%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=3kaEbgdMm%2F4Ei5jA2S0e
> 3VTDY8snp24t1%2Bj8hMxKE%2Fs%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692690461%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=8G4q1eMKlNNDlu6sqkMB4Geam1nXpF82rzh%2BW0kKNKA%3D&reserved
> >> =
> >> 0
> >>>> -----------------------------------------------------------------
> -
> >> --
> >>> ------------------------------------------------------------------
> --
> >>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>> Requests:
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9938856%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=HIPMO3F5OtUG2aPgbGFQXb
> frQDiDMguO233kDvMg7v0%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692700162%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=lo%2BQaRjzgJWpRalKvzxOtnniUvu4zZqrh7IBcwHmmhA%3D&reserved
> >> =
> >> 0
> >>> ------------------------------------------------------------------
> --
> >>>
> >>
> _____________________________________________________________________
> >> _ ______________________________________
> >>> Ce message et ses pieces jointes peuvent contenir des informations
> >> confidentielles ou privilegiees et ne doivent donc
> >>> pas etre diffuses, exploites ou copies sans autorisation. Si vous
> >> avez recu ce message par erreur, veuillez le signaler
> >>> a l'expediteur et le detruire ainsi que les pieces jointes. Les
> >> messages electroniques etant susceptibles d'alteration,
> >>> Orange decline toute responsabilite si ce message a ete altere,
> >> deforme ou falsifie. Merci.
> >>>
> >>> This message and its attachments may contain confidential or
> >> privileged information that may be protected by law;
> >>> they should not be distributed, used or copied without
> >> authorisation.
> >>> If you have received this email in error, please notify the sender
> >> and delete this message and its attachments.
> >>> As emails may be altered, Orange is not liable for messages that
> >> have been modified, changed or falsified.
> >>> Thank you.
> >>> ------------------------------------------------------------------
> --
> >>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>> Requests:
> >>
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww%
> 2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C8d70938e4b994ac9035
> b08dc5542e443%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63847899301
> 9945334%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=QgCgEf5r%2F8OqfxYrqBy%
> 2FbKTNTSFoUIC1lt4PGFr7V9w%3D&reserved=0.
> >>
> ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C02%7Cmohamed.boucadair
> >> %
> >>
> 40orange.com%7C4d62f7af67844de7b14708dc5310dfbb%7C90c7a20af34b40bfbc4
> >> 8
> >>
> b9253b6f5d20%7C0%7C0%7C638476580692709737%7CUnknown%7CTWFpbGZsb3d8eyJ
> >> W
> >>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C
> >> %
> >>
> 7C%7C&sdata=FPmQ%2BKFaGhyhe63jitjHn%2B6GW1h3Re6ZF5nuWHtiD5M%3D&reserv
> >> e
> >> d=0
> >>> ------------------------------------------------------------------
> --
> >>>
> >>
> _____________________________________________________________________
> >> _ ______________________________________
> >>> Ce message et ses pieces jointes peuvent contenir des informations
> >> confidentielles ou privilegiees et ne doivent donc
> >>> pas etre diffuses, exploites ou copies sans autorisation. Si vous
> >> avez recu ce message par erreur, veuillez le signaler
> >>> a l'expediteur et le detruire ainsi que les pieces jointes. Les
> >> messages electroniques etant susceptibles d'alteration,
> >>> Orange decline toute responsabilite si ce message a ete altere,
> >> deforme ou falsifie. Merci.
> >>>
> >>> This message and its attachments may contain confidential or
> >> privileged information that may be protected by law;
> >>> they should not be distributed, used or copied without
> >> authorisation.
> >>> If you have received this email in error, please notify the sender
> >> and delete this message and its attachments.
> >>> As emails may be altered, Orange is not liable for messages that
> >> have been modified, changed or falsified.
> >>> Thank you.
> >>
> >
> >
> ______________________________________________________________________
> > ______________________________________
> > Ce message et ses pieces jointes peuvent contenir des informations
> > confidentielles ou privilegiees et ne doivent donc pas etre
> diffuses,
> > exploites ou copies sans autorisation. Si vous avez recu ce message
> > par erreur, veuillez le signaler a l'expediteur et le detruire ainsi
> que les pieces jointes. Les messages electroniques etant susceptibles
> d'alteration, Orange decline toute responsabilite si ce message a ete
> altere, deforme ou falsifie. Merci.
> >
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should not
> be distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the sender
> and delete this message and its attachments.
> > As emails may be altered, Orange is not liable for messages that
> have been modified, changed or falsified.
> > Thank you.
> 
> 

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.