Re: RFC6724-bis?
Mark Smith <markzzzsmith@gmail.com> Thu, 22 September 2022 23:58 UTC
Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66263C1522BA for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 16:58:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.392
X-Spam-Level:
X-Spam-Status: No, score=0.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.998, HK_RANDOM_FROM=0.998, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9SB4hKIhCvWe for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 16:58:45 -0700 (PDT)
Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91C31C14F74F for <ipv6@ietf.org>; Thu, 22 Sep 2022 16:58:45 -0700 (PDT)
Received: by mail-pj1-x102d.google.com with SMTP id i15-20020a17090a4b8f00b0020073b4ac27so3758455pjh.3 for <ipv6@ietf.org>; Thu, 22 Sep 2022 16:58:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=GNtT9kCvCi6TmUz7Xn8uQPwHsA8MUDsN/ULii0Kta0I=; b=ABPn4OVBM3ClC2NlLubTq6HlPKpppK9VLmmSwiPrjIG3RWcv0+UJZd5uXX9g8+etST chMLgdiodFLs6UL2FvPBKGzMHnKALReKIPRZClMPTqXYoWsEuLmwyTedIIQ4YPcQMEEj ObSmUXUCYePN5bMQ9V7wRr4fhYyN/eWdz8HeFGbk25iNHwjxXAwehVqH7jR5bHQQAeRI hM2cNnhhlEUbYATMrOdrBv3DnY+OK8vjlRLXtHV+W+g8/y5+YR40Xf47t7s4lUI+dO9f fej3oTbwozTDwkZQj9o4Db4h6pzXDil0i4c1cHTl/z0TdaKahiXp6ov9W/2/xavdzFI6 5w7g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=GNtT9kCvCi6TmUz7Xn8uQPwHsA8MUDsN/ULii0Kta0I=; b=OGz8IvaLl+cfP77BXieTnjMV7Bg+EsCbr6QZ+2srIavlcq/YfNEi08IbmsO91OOtBZ IMNgNEeKvg/bNhFZtH4MR41zaU1rAnnuYMp9e9f43+de6gS/HKSYYPkdOCZ4LCBEiPD/ nK4X/Ec9OWF4m4cDvvob+UHt1zTsD6Uf9Azqaoi5cNCII+JZN2HxVjCB7ypUOLfBJ/Fp UdgHYVdtoguciPxWQU5FmY9Y/PoFv7ANnzHC7kDQ8Gq2l5yY4Rb5mK1k5u9sBRfYnMyc g+PHvCF6Av/HlNWQ2yASyP9jscmfnPyrreSgGK4FadO3L3DHU8l8+0M0+inx0pfOeL1u vQ4A==
X-Gm-Message-State: ACrzQf13fwRBNTpnOA5mp6hLu3utMtw58/B4MjTv9ZzMUaySk/LawAhk JgJTy2baN4rIq21MaaHf3valGaxcBg0VSTHzn7Q=
X-Google-Smtp-Source: AMsMyM4W6axr9z1ww3yQfw8frdMOTIJbHEvG3X7F4HaKYDRTMwYwyOWiB2sSom4NbHW0HscFaxdnjZ//L+vtBBH7Gnk=
X-Received: by 2002:a17:90b:1c8d:b0:203:cc25:4eb5 with SMTP id oo13-20020a17090b1c8d00b00203cc254eb5mr6480629pjb.132.1663891124694; Thu, 22 Sep 2022 16:58:44 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAM5+tA9kttCKrZaoB7UzNdE6TU1qGNMaxDmWvFtRvpB4A8+WHA@mail.gmail.com> <8FE71499-D155-4853-A964-6617F6EA2069@gmail.com> <CAM5+tA9QuYxVs+NXBD3dAYr_Y=95bWt63WjmEMDOfegL0Z4otA@mail.gmail.com> <CAM5+tA_hg2sXXsYw6Tcx-ytRAMkKQcFw8a3N7SfEXwbuPm0LMw@mail.gmail.com> <00ea3b70-ba8e-b6ef-e1ce-fdd56828f506@gmail.com> <CAPt1N1=_9Rwj-HnUZKWfatARbHWptArmSAV-qdi8MKyoBf9R0A@mail.gmail.com> <CAO42Z2xZ_-mDh66A9DK+3ieEqGMqW0Pt+mZzVOmzz4cDRUTEXA@mail.gmail.com> <CAPt1N1nqwMvVHvEGAx0jxgWhbW9ZUQfAZSDn-qRYQ0CDy-EGKQ@mail.gmail.com> <17a28c173ed640e68b1cbf504bbeae49@huawei.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com> <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com>
In-Reply-To: <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Fri, 23 Sep 2022 09:28:32 +0930
Message-ID: <CAO42Z2xf1jL_e4H6y=RgLKyxBCJfk2wL_fnLtBHSQ-ZiFymYUA@mail.gmail.com>
Subject: Re: RFC6724-bis?
To: David Farmer <farmer=40umn.edu@dmarc.ietf.org>
Cc: Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006eb55705e94cd77c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/AGn0ngIh9HMfNQCgHXAHqOIqJyE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 23:58:47 -0000
On Fri, 23 Sept 2022, 02:51 David Farmer, <farmer=40umn.edu@dmarc.ietf.org> wrote: > Experience has shown us that despite recommendations to the contrary, ULAs > are in the Public DNS, how much is questionable, but it exists nonetheless. > > Further, using the converse to the argument that address collisions are a > very low probability event, if ULA prefixes are randomly selected, as > recommended in RFC 4193; therefore, any such randomly selected ULA prefix > learned from the DNS is going to have a very high probability that it is > unreachable. This is why, we shouldn’t prefer ULA address unless there is > knowledge the ULA prefix is actually locally connected. > > It’s worth repeating, unless a ULA prefix is know to be locally connected, > there is a very high probability that any connections to it will simply > fail. > > Now I have some related questions, is this connection failure going to > result in a full TCP timeout or happy eyeballs timer expiring? Or, will an > ICMP destination unreachable or other ICMP message shortcut the TCP timeout > or the happy eyeballs timer? Will most CPEs on the market generate an ICMP > destination unreachable, an ICMP administratively disallowed, or simply > just forward the packet to the upstream ISP using the default route? Would > most ISPs generate an ICMP destination unreachable for the ULA in this > case? Finally, even if the ISP’s router generates the ICMP destination > unreachable, in most cases, I don’t believe the ISP will have a route back > to the originating ULA address anyway. > > So, I think we are probably better off with SA/DA selection not preferring > ULA unless the prefix is know to be local. This is the best guess. > You're optimising for the uncommon case. . > > Thanks. > > On Thu, Sep 22, 2022 at 11:05 Vasilenko Eduard <vasilenko.eduard= > 40huawei.com@dmarc.ietf.org> wrote: > >> I hope DNS advertising ULA is not foreign. Problem solved. >> >> If the organization is using many ULA prefixes – they should be >> distributed everywhere, >> >> Or DNS should announce different views for different company regions. >> >> >> >> You are looking for the solution for the configuration inconsistency: DNS >> has announced something but routing is not available. >> >> Ed/ >> >> *From:* Ted Lemon [mailto:mellon@fugue.com] >> *Sent:* Thursday, September 22, 2022 6:54 PM >> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com> >> *Cc:* Mark Smith <markzzzsmith@gmail.com>; 6man WG <ipv6@ietf.org> >> *Subject:* Re: RFC6724-bis? >> >> >> >> If I have a GUA and no ULA, and I get a ULA, I'm going to guess that I >> should use the GUA because I have no choice. If I have a GUA and a ULA, and >> I see a foreign ULA, longest match will choose the ULA, not the GUA, but >> there is no guarantee that the ULA is reachable from the foreign ULA. So >> no, longest match isn't actually going to reliably guess right here. >> Practically speaking, in this case using the GUA is always better, because >> even if my ULA happens to be reachable from the device with the foreign >> ULA, the GUA will still also work. >> >> >> >> On Thu, Sep 22, 2022 at 11:50 AM Vasilenko Eduard < >> vasilenko.eduard@huawei.com> wrote: >> >> The longest match helps to choose what is local >> >> It is rule 8 in RFC 6724. >> >> Already works. >> >> Ed/ >> >> *From:* ipv6 [mailto:ipv6-bounces@ietf.org] *On Behalf Of *Ted Lemon >> *Sent:* Thursday, September 22, 2022 6:35 PM >> *To:* Mark Smith <markzzzsmith@gmail.com> >> *Cc:* 6man WG <ipv6@ietf.org> >> *Subject:* Re: RFC6724-bis? >> >> >> >> Still, a local ULA can be presumed reachable, whereas a ULA that is not >> configured locally may or may not be reachable. Ideally we want to try the >> thing that will work first. And we’ve actually seen non-local ULAs fail in >> the wild. So while doing happy eyeballs is a great way to avoid failing >> when your best guess is wrong, making better guesses is still good. >> >> >> >> Op do 22 sep. 2022 om 11:30 schreef Mark Smith <markzzzsmith@gmail.com> >> >> >> >> On Thu, 22 Sept 2022, 20:38 Ted Lemon, <mellon@fugue.com> wrote: >> >> Wouldn’t increasing the ULA priority have the problem that we’d get >> longest match wins on alien ULAs though? I think that was why the “add >> local ULAs to the table” rule was originally proposed. >> >> >> >> Why is do people think the static default DA/SA selection will always >> accurately choose the best outcome for a dynamic network? >> >> >> >> The set of answers from DA/SA selection are supposed to be tested until >> one of them succeeds. >> >> >> >> A ULA response in a DNS RR should be the best answer most of the time, >> however sometimes the alternative GUA will be better and be successful. >> >> >> >> That is, try the ULA destination, and if that fails, try the GUA DA, when >> both are provided in a DNS response. >> >> >> >> A static algorithm like default DA/SA selection is sometimes going to be >> wrong when being applied to a dynamic situation. >> >> >> >> Regards, >> >> Mark. >> >> >> >> >> >> Local ULAs might also be discovered through mDNS, which is I pretty much >> ubiquitous on home networks. >> >> >> >> Op do 22 sep. 2022 om 01:25 schreef Brian E Carpenter < >> brian.e.carpenter@gmail.com> >> >> I agree with Bob that a stand-alone draft (Updates: 6724) is probably >> a simpler approach than re-opening the whole RFC to comments. >> >> Apart from that, the proto-draft says: >> >> An implementation MUST automatically add additional site-specific rows >> to the default table based on its configured addresses, such as for >> Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] addresses, >> for instance (see Sections 10.6 and 10.7 for examples). >> >> That doesn't really compute, because 6to4 is pretty much ancient history. >> If we make a change of this kind, I think it should be specific to ULAs. >> And if we want to make the section 10.6 behaviour mandatory, I think we'd >> want the wording to be precise (with an explicit description of the >> algorithm the kernel should use). >> >> We should also, I think, state clearly that the expectation is that ULAs >> will normally be discovered via split-horizon DNS, or some other local >> discovery mechanism (e.g. the one in GRASP [RFC8990]). >> >> The other question is: would it be sufficient to do something much >> simpler, >> i.e., simply boost the ULA prefix in the default policy table and all >> examples: >> >> fc00::/7 31 13 >> >> Where's the harm in that? It will mean that ULAs are picked by the >> longest match rule when they are present. That won't happen unless >> there *are* ULAs, so it has precisely zero impact on sites that don't >> use them. >> >> It does no harm to add higher precedence for locally defined ULAs, but >> I am not convinced it's useful either, in the normal case. >> >> The proto-draft also says: >> >> This behavior is required for proper functioning of ULA addressing, >> thus preserving the preference of IPv6 over legacy IPv4 in dual >> stacked >> environments as detailed in draft-v6ops-ula. Additionally, requiring >> local site-specific addressing entry into all nodes preference list >> further scopes the network communication to local and remote per the >> respective addressing blocks and creates a more consistent operational >> model and user experience. >> >> I agree with the statement, but it would sit more naturally in a >> stand-alone update than as a patch on RFC6724. >> >> Regards >> Brian >> >> On 21-Sep-22 20:47, Nick Buraglio wrote: >> > I've gotten some feedback that the diff is hard to read because of the >> > formatting, so here is a link to the proposal. Please bear in mind >> > that this is *very* crude and was meant to simply track the idea. >> > https://github.com/buraglio/ietf-draft-buraglio-rfc6724-update >> > >> > ---- >> > nb >> > >> > On Wed, Sep 21, 2022 at 10:29 AM Nick Buraglio <buraglio@es.net> wrote: >> >> >> >> Totally agree - this is just a starting point. I am happy to work on >> >> whatever the group feels is the right approach and what we feel will >> >> reach consensus. >> >> >> >> ---- >> >> nb >> >> >> >> On Wed, Sep 21, 2022 at 10:25 AM Tim Chown <tjc.ietf@gmail.com> wrote: >> >>> >> >>> Thanks Nick. >> >>> >> >>> I think the aim here is to see if the WG can get consensus on an >> approach to address the problem, and document that for consideration for WG >> adoption. Nick has diffs below to 6724, but it could be a short standalone >> document the updates 6724. >> >>> >> >>> Tim >> >>> >> >>>> On 21 Sep 2022, at 09:02, Nick Buraglio <buraglio@es.net> wrote: >> >>>> >> >>>> The changes that I had proposed in my github repo are below, these >> are >> >>>> just a starting point, I welcome any and all input. >> >>>> >> >>>> >> >>>> >> >>>> @@ -12,7 +12,7 @@ ISSN: 2070-1721 >> >>>> A. Matsumoto >> >>>> >> >>>> >> >>>> Default Address Selection for Internet Protocol Version 6 (IPv6) >> >>>> - >> >>>> + ietf-draft-buraglio-rfc6724-update.txt >> >>>> Abstract >> >>>> >> >>>> This document describes two algorithms, one for source address >> >>>> @@ -347,14 +347,14 @@ RFC 6724 Default Address Selection >> for >> >>>> IPv6 September 2012 >> >>>> fec0::/10 1 11 >> >>>> 3ffe::/16 1 12 >> >>>> fec0::/10 1 11 >> >>>> 3ffe::/16 1 12 >> >>>> >> >>>> - An implementation MAY automatically add additional site-specific >> rows >> >>>> + An implementation MUST automatically add additional >> site-specific rows >> >>>> to the default table based on its configured addresses, such as >> for >> >>>> Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] >> addresses, >> >>>> for instance (see Sections 10.6 and 10.7 for examples). Any such >> >>>> rows automatically added by the implementation as a result of >> address >> >>>> acquisition MUST NOT override a row for the same prefix >> configured >> >>>> via other means. That is, rows can be added but never updated >> >>>> - automatically. An implementation SHOULD provide a means (the >> >>>> + automatically. An implementation MUST provide a means (the >> >>>> Automatic Row Additions flag) for an administrator to disable >> >>>> automatic row additions. >> >>>> >> >>>> @@ -363,7 +363,15 @@ RFC 6724 Default Address Selection for >> >>>> IPv6 September 2012 >> >>>> addresses, 6to4 source addresses with 6to4 destination addresses, >> >>>> etc. Another effect of the default policy table is to prefer >> >>>> communication using IPv6 addresses to communication using IPv4 >> >>>> - addresses, if matching source addresses are available. >> >>>> + addresses, if matching source addresses are available. >> >>>> + >> >>>> + This behavior is required for proper functioning of ULA >> addressing, >> >>>> + thus preserving the preference of IPv6 over legacy IPv4 in dual >> stacked >> >>>> + environments as detailed in draft-v6ops-ula. Additionally, >> requiring >> >>>> + local site-specific addressing entry into all nodes preference >> list >> >>>> + further scopes the network communication to local and remote per >> the >> >>>> + respective addressing blocks and creates a more consistent >> operational >> >>>> + model and user experience. >> >>>> >> >>>> Policy table entries for address prefixes that are not of global >> >>>> scope MAY be qualified with an optional zone index. If so, a >> prefix >> >>>> @@ -1541,7 +1549,7 @@ RFC 6724 Default Address Selection >> for >> >>>> IPv6 September 2012 >> >>>> C., and M. Azinger, "IANA-Reserved IPv4 Prefix >> for >> >>>> Shared Address Space", BCP 153, RFC 6598, April >> 2012. >> >>>> >> >>>> - >> >>>> + >> >>>> >> >>>> >> >>>> >> >>>> @@ -1775,6 +1783,9 @@ Authors' Addresses >> >>>> >> >>>> >> >>>> ---- >> >>>> nb >> >>>> >> >>>> On Tue, Sep 20, 2022 at 6:06 PM Tim Chown <tjc.ietf@gmail.com> >> wrote: >> >>>>> >> >>>>> Hi, >> >>>>> >> >>>>> As an author of RFC6724 I’ve had the discussions about a possible >> update of RFC6724 brought to my attention. >> >>>>> >> >>>>> An example thread over on v6ops is >> https://mailarchive.ietf.org/arch/msg/v6ops/W6HjHc11JX364soq3t3gFMHSawE/, >> but there are others. >> >>>>> >> >>>>> Nick Buraglio has documented the problem in >> draft-ietf-v6ops-ula-00. The short of it is that RFC1918 IPv4 addresses >> may be preferred to IPv6 ULAs in certain circumstances, which I would agree >> is not desired behaviour. >> >>>>> >> >>>>> There are a few ways we might look to address this. There is a >> proposal from Nick (not yet published outside a git repo) to address it by >> changing wording in section 2.1, with a couple of MAYs becoming MUSTs, and >> adding an extra explaining paragraph. This basically firms up the >> requirement to follow 6.10 on adding an extra precedence line for local ULA >> prefix(es). >> >>>>> >> >>>>> Now, that may or may not be the preferred solution of the WG, but I >> think there’s a few questions to consider: >> >>>>> >> >>>>> 1. Is there agreement we should address the problem? I’d assume so >> because Nick's problem draft was adopted by v6ops. >> >>>>> >> >>>>> 2. If so, is 6man the place to do it? I think it has to be. >> RFC6724 was born here. >> >>>>> >> >>>>> 3. How do we determine the best solution to the problem? I suspect >> there are nuances in play that will make a one size fit all ’simple’ fix >> tricky, but I look forward to the discussion. Nick has one proposal that >> counts to a couple of word changes and an extra paragraph, which I’d >> encourage him to share here, but there are other approaches proposed on >> v6ops. I think either way, it will require some update to or for RFC6724. >> >>>>> >> >>>>> 4. Does this work warrant a full -bis or would a separate RFC that >> updates 6724 be better? A separate Updating draft might better highlight >> the issue to implementors. But then RFC6724 is now ten years old, and >> RFC3484 which it replaced was nine years before that. >> >>>>> >> >>>>> 5. If we choose to open up a full -bis, are there any other worms >> in this can? I have a feeling also here I know the likely answer…. >> >>>>> >> >>>>> Anyway, over to the WG… thoughts? >> >>>>> >> >>>>> Tim >> >>> >> > >> > -------------------------------------------------------------------- >> > IETF IPv6 working group mailing list >> > ipv6@ietf.org >> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >> > -------------------------------------------------------------------- >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >> -------------------------------------------------------------------- >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >> -------------------------------------------------------------------- >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >> -------------------------------------------------------------------- >> > -- > =============================================== > David Farmer Email:farmer@umn.edu > Networking & Telecommunication Services > Office of Information Technology > University of Minnesota > 2218 University Ave SE Phone: 612-626-0815 > Minneapolis, MN 55414-3029 Cell: 612-812-9952 > =============================================== > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- >
- RFC6724-bis? Tim Chown
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Tim Chown
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Bob Hinden
- Re: RFC6724-bis? Brian E Carpenter
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Mark Smith
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Michael Richardson
- Re: RFC6724-bis? David Farmer
- RE: RFC6724-bis? Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Michael Richardson
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Mark Smith
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? David Farmer
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Brian E Carpenter
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? David Farmer
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? David Farmer
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Nick Buraglio
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Mark Smith
- Re: Network merge [Re: RFC6724-bis?] Ted Lemon
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Mark Smith
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Timothy Winters
- Re: Network merge [Re: RFC6724-bis?] Nick Buraglio
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- Re: Network merge [Re: RFC6724-bis?] Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Michael Richardson