Re: RFC6724-bis?

Ted Lemon <mellon@fugue.com> Thu, 22 September 2022 19:56 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCD7C14CF10 for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 12:56:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGYZ1IrekKpF for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 12:56:05 -0700 (PDT)
Received: from mail-oa1-x2e.google.com (mail-oa1-x2e.google.com [IPv6:2001:4860:4864:20::2e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE539C14CE28 for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:55:41 -0700 (PDT)
Received: by mail-oa1-x2e.google.com with SMTP id 586e51a60fabf-1225219ee46so15471809fac.2 for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:55:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=Am4cy6KtfYvnCefYe0cugAshVDxl73R0cbkiDj1Clck=; b=JPTeAOWAUaZj6pmdBilFS2q7KaKX2ETEBgQT1umVHWlevuGGv5/+G0d81lW45Wzliw yOjoivGVcVLRTTPs8Q+1S3I84Bcmbz4zaAI31fPnspF6yw5h3QpMILJdHlWEOODSb6nE VhNg0MAa/y8ZRdz7uzKP/u9jAYfszOEQFZacaybaq+HRdGmLxv9MdE0qdxxcBWPqlcqV 0hLdge6/76WEA67J3K8Lf7PyyvqxhMVhhXkDfVmxiF3ynGm9u+cgVJ+2yFzLEYTf9hU8 BiaVDEYKhr84bBxURsDE+EN7qdFjCZbyRGQaB94GaYOjeOED7CB+DF8MkrQa1hHQ0OQB h/8A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=Am4cy6KtfYvnCefYe0cugAshVDxl73R0cbkiDj1Clck=; b=pXqBIwd3uMR7IYIk4Rsmeit8cUnCFqvEAkgoKLmwkwJPQ4jPkGdTBWI06x6dgTark2 5XTCyxmc6C4mwqXe6O+Q8kkt3u2VVJmfho35/0Mcp9SH0uxRSkIqwai7+GOjRaPNBg82 J9X14viwq8/LTzlxNAK7g0CCszeboHArYGssB3V6ZJvqW5+QjvhV5YDdtIYlQsag7VC+ M5Q8us+NPb0R6Rva5CmV+RVGwd7k4+EL5/lKu3oORzVXv4sA/+RpUaM/ay5hZdYvdGen H+DDh68wgHOiK/Ari0PkGb0dk3GGt0yyfVoHvV4mDwjCpKomYFK7rU5WJFZPavi3eAzx JjWA==
X-Gm-Message-State: ACrzQf1dPP3bX/hXCtYiv0FyyDrxIrbPo2p+w4t2/OwrLAjDEzfdbpTl 5Htm6KCf8BVpHLJJGqK4+izHa3zm0CDwowHS8cYcCz+fVdc=
X-Google-Smtp-Source: AMsMyM7ajGMMN7JWprwnPqIV6rsZFIKz8GZ/wKlTHiyUOxPAXfNr2voQZ32irb1KfOkXCl+CDXjtopgHZKWaILBdu7E=
X-Received: by 2002:a05:6870:524b:b0:12c:cfd2:81c0 with SMTP id o11-20020a056870524b00b0012ccfd281c0mr2964349oai.209.1663876540321; Thu, 22 Sep 2022 12:55:40 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAM5+tA9kttCKrZaoB7UzNdE6TU1qGNMaxDmWvFtRvpB4A8+WHA@mail.gmail.com> <8FE71499-D155-4853-A964-6617F6EA2069@gmail.com> <CAM5+tA9QuYxVs+NXBD3dAYr_Y=95bWt63WjmEMDOfegL0Z4otA@mail.gmail.com> <CAM5+tA_hg2sXXsYw6Tcx-ytRAMkKQcFw8a3N7SfEXwbuPm0LMw@mail.gmail.com> <00ea3b70-ba8e-b6ef-e1ce-fdd56828f506@gmail.com> <CAPt1N1=_9Rwj-HnUZKWfatARbHWptArmSAV-qdi8MKyoBf9R0A@mail.gmail.com> <CAO42Z2xZ_-mDh66A9DK+3ieEqGMqW0Pt+mZzVOmzz4cDRUTEXA@mail.gmail.com> <CAPt1N1nqwMvVHvEGAx0jxgWhbW9ZUQfAZSDn-qRYQ0CDy-EGKQ@mail.gmail.com> <17a28c173ed640e68b1cbf504bbeae49@huawei.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com> <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com> <a7bb7709386b4c51b262d0664d81357e@huawei.com>
In-Reply-To: <a7bb7709386b4c51b262d0664d81357e@huawei.com>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 22 Sep 2022 15:55:04 -0400
Message-ID: <CAPt1N1kFGHRjuEJgi-z-Cfohjr5goAOXdxRGKK3rsP3r4xDZ+g@mail.gmail.com>
Subject: Re: RFC6724-bis?
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: David Farmer <farmer=40umn.edu@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000022e9ef05e9497298"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/AThe-82EZ8izFUPBUkQ1pN33iKE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 19:56:10 -0000

It's entirely valid to have a ULA configured locally that is not reachable
remotely. And it is entirely reasonable for this to happen on a network on
which a ULA is configured that is reachable from the network on which the
more locally-scoped ULA is present.

If you are lucky, you will get an ICMP destination unreachable based on
your source address when a packet sourced from that ULA hits the edge of
the ULA's scope of validity, but I think it's unreasonable to rely on the
network doing this. That's more of a best case scenario, network admin gets
a cookie kind of situation. I think a destination unreachable response is
more likely when the /remote/ ULA is unreachable from the point of origin
of the connection, but I still don't think that we should assume
reachability, because even if the network administrator doesn't get a
cookie in this situation, it's still quite likely that there are many
networks where such a response will not occur.

On Thu, Sep 22, 2022 at 1:47 PM Vasilenko Eduard <
vasilenko.eduard@huawei.com> wrote:

> I hope ULA in public DNS is not pointing to Google or something big. Then
> why is it a problem if ULA is advertised for abcd.efgh.klmno.com?
>
> It is a problem only for this resource. Good luck to them.
>
>
>
> It would not be a problem for another organization till the organization
> would increase precedence for FC/7 above GUA.
>
>
>
> Moreover, it is not a problem for another organization till the
> organization would not activate ULA PIO inside,
>
> Because Rule 5: Prefer matching label would prefer GUA despite ULA and GUA received in the DNS.
>
> If no PIO – nothing to match for the source even if FC/7 is already the highest precedence.
>
>
>
> And only if the organization would activate ULA PIO, change FC/7 preference above GUA, and somebody requests abcd.efgh.klmno.com– then would be a problem.
>
> It looks pretty artificial situation.
>
>
>
> Then TCP would not receive ACK. In 300ms (old style HYv1) host would
> switch to IPv4.
>
> HYv2 is faster (50ms) but supported only by Apple.
>
>
>
> Ed/
>
> *From:* David Farmer [mailto:farmer=40umn.edu@dmarc.ietf.org]
> *Sent:* Thursday, September 22, 2022 8:21 PM
> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
> *Cc:* 6man WG <ipv6@ietf.org>; Ted Lemon <mellon@fugue.com>
> *Subject:* Re: RFC6724-bis?
>
>
>
> Experience has shown us that despite recommendations to the contrary, ULAs
> are in the Public DNS, how much is questionable, but it exists nonetheless.
>
>
>
> Further, using the converse to the argument that address collisions are a
> very low probability event, if ULA prefixes are randomly selected, as
> recommended in RFC 4193; therefore, any such randomly selected ULA prefix
> learned from the DNS is going to have a very high probability that it is
> unreachable. This is why, we shouldn’t prefer ULA address unless there is
> knowledge the ULA prefix is actually locally connected.
>
>
>
> It’s worth repeating, unless a ULA prefix is know to be locally connected,
> there is a very high probability that any connections to it will simply
> fail.
>
>
>
> Now I have some related questions, is this connection failure going to
> result in a full TCP timeout or happy eyeballs timer expiring? Or, will an
> ICMP destination unreachable or other ICMP message shortcut the TCP timeout
> or the happy eyeballs timer? Will most CPEs on the market generate an ICMP
> destination unreachable, an ICMP administratively disallowed, or simply
> just forward the packet to the upstream ISP using the default route? Would
> most ISPs generate an ICMP destination unreachable for the ULA in this
> case? Finally, even if the ISP’s router generates the ICMP destination
> unreachable, in most cases, I don’t believe the ISP will have a route back
> to the originating ULA address anyway.
>
>
>
> So, I think we are probably better off with SA/DA selection not preferring
> ULA unless the prefix is know to be local.  This is the best guess.
>
>
>
> Thanks.
>
>
>
> On Thu, Sep 22, 2022 at 11:05 Vasilenko Eduard <vasilenko.eduard=
> 40huawei.com@dmarc.ietf.org> wrote:
>
> I hope DNS advertising ULA is not foreign. Problem solved.
>
> If the organization is using many ULA prefixes – they should be
> distributed everywhere,
>
> Or DNS should announce different views for different company regions.
>
>
>
> You are looking for the solution for the configuration inconsistency: DNS
> has announced something but routing is not available.
>
> Ed/
>
> *From:* Ted Lemon [mailto:mellon@fugue.com]
> *Sent:* Thursday, September 22, 2022 6:54 PM
> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
> *Cc:* Mark Smith <markzzzsmith@gmail.com>; 6man WG <ipv6@ietf.org>
> *Subject:* Re: RFC6724-bis?
>
>
>
> If I have a GUA and no ULA, and I get a ULA, I'm going to guess that I
> should use the GUA because I have no choice. If I have a GUA and a ULA, and
> I see a foreign ULA, longest match will choose the ULA, not the GUA, but
> there is no guarantee that the ULA is reachable from the foreign ULA. So
> no, longest match isn't actually going to reliably guess right here.
> Practically speaking, in this case using the GUA is always better, because
> even if my ULA happens to be reachable from the device with the foreign
> ULA, the GUA will still also work.
>
>
>
> On Thu, Sep 22, 2022 at 11:50 AM Vasilenko Eduard <
> vasilenko.eduard@huawei.com> wrote:
>
> The longest match helps to choose what is local
>
> It is rule 8 in RFC 6724.
>
> Already works.
>
> Ed/
>
> *From:* ipv6 [mailto:ipv6-bounces@ietf.org] *On Behalf Of *Ted Lemon
> *Sent:* Thursday, September 22, 2022 6:35 PM
> *To:* Mark Smith <markzzzsmith@gmail.com>
> *Cc:* 6man WG <ipv6@ietf.org>
> *Subject:* Re: RFC6724-bis?
>
>
>
> Still, a local ULA can be presumed reachable, whereas a ULA that is not
> configured locally may or may not be reachable. Ideally we want to try the
> thing that will work first. And we’ve actually seen non-local ULAs fail in
> the wild. So while doing happy eyeballs is a great way to avoid failing
> when your best guess is wrong, making better guesses is still good.
>
>
>
> Op do 22 sep. 2022 om 11:30 schreef Mark Smith <markzzzsmith@gmail.com>
>
>
>
> On Thu, 22 Sept 2022, 20:38 Ted Lemon, <mellon@fugue.com> wrote:
>
> Wouldn’t increasing the ULA priority have the problem that we’d get
> longest match wins on alien ULAs though?  I think that was why the “add
> local ULAs to the table” rule was originally proposed.
>
>
>
> Why is do people think the static default DA/SA selection will always
> accurately choose the best outcome for a dynamic network?
>
>
>
> The set of answers from DA/SA selection are supposed to be tested until
> one of them succeeds.
>
>
>
> A ULA response in a DNS RR should be the best answer most of the time,
> however sometimes the alternative GUA will be better and be successful.
>
>
>
> That is, try the ULA destination, and if that fails, try the GUA DA, when
> both are provided in a DNS response.
>
>
>
> A static algorithm like default DA/SA selection is sometimes going to be
> wrong when being applied to a dynamic situation.
>
>
>
> Regards,
>
> Mark.
>
>
>
>
>
> Local ULAs might also be discovered through mDNS, which is I pretty much
> ubiquitous on home networks.
>
>
>
> Op do 22 sep. 2022 om 01:25 schreef Brian E Carpenter <
> brian.e.carpenter@gmail.com>
>
> I agree with Bob that a stand-alone draft (Updates: 6724) is probably
> a simpler approach than re-opening the whole RFC to comments.
>
> Apart from that, the proto-draft says:
>
>     An implementation MUST automatically add additional site-specific rows
>     to the default table based on its configured addresses, such as for
>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] addresses,
>     for instance (see Sections 10.6 and 10.7 for examples).
>
> That doesn't really compute, because 6to4 is pretty much ancient history.
> If we make a change of this kind, I think it should be specific to ULAs.
> And if we want to make the section 10.6 behaviour mandatory, I think we'd
> want the wording to be precise (with an explicit description of the
> algorithm the kernel should use).
>
> We should also, I think, state clearly that the expectation is that ULAs
> will normally be discovered via split-horizon DNS, or some other local
> discovery mechanism (e.g. the one in GRASP [RFC8990]).
>
> The other question is: would it be sufficient to do something much simpler,
> i.e., simply boost the ULA prefix in the default policy table and all
> examples:
>
>       fc00::/7              31    13
>
> Where's the harm in that? It will mean that ULAs are picked by the
> longest match rule when they are present. That won't happen unless
> there *are* ULAs, so it has precisely zero impact on sites that don't
> use them.
>
> It does no harm to add higher precedence for locally defined ULAs, but
> I am not convinced it's useful either, in the normal case.
>
> The proto-draft also says:
>
>     This behavior is required for proper functioning of ULA addressing,
>     thus preserving the preference of IPv6 over legacy IPv4 in dual stacked
>     environments as detailed in draft-v6ops-ula. Additionally, requiring
>     local site-specific addressing entry into all nodes preference list
>     further scopes the network communication to local and remote per the
>     respective addressing blocks and creates a more consistent operational
>     model and user experience.
>
> I agree with the statement, but it would sit more naturally in a
> stand-alone update than as a patch on RFC6724.
>
> Regards
>     Brian
>
> On 21-Sep-22 20:47, Nick Buraglio wrote:
> > I've gotten some feedback that the diff is hard to read because of the
> > formatting, so here is a link to the proposal. Please bear in mind
> > that this is *very* crude and was meant to simply track the idea.
> > https://github.com/buraglio/ietf-draft-buraglio-rfc6724-update
> >
> > ----
> > nb
> >
> > On Wed, Sep 21, 2022 at 10:29 AM Nick Buraglio <buraglio@es.net> wrote:
> >>
> >> Totally agree - this is just a starting point. I am happy to work on
> >> whatever the group feels is the right approach and what we feel will
> >> reach consensus.
> >>
> >> ----
> >> nb
> >>
> >> On Wed, Sep 21, 2022 at 10:25 AM Tim Chown <tjc.ietf@gmail.com> wrote:
> >>>
> >>> Thanks Nick.
> >>>
> >>> I think the aim here is to see if the WG can get consensus on an
> approach to address the problem, and document that for consideration for WG
> adoption.  Nick has diffs below to 6724, but it could be a short standalone
> document the updates 6724.
> >>>
> >>> Tim
> >>>
> >>>> On 21 Sep 2022, at 09:02, Nick Buraglio <buraglio@es.net> wrote:
> >>>>
> >>>> The changes that I had proposed in my github repo are below, these are
> >>>> just a starting point, I welcome any and all input.
> >>>>
> >>>>
> >>>>
> >>>> @@ -12,7 +12,7 @@ ISSN: 2070-1721
> >>>>        A. Matsumoto
> >>>>
> >>>>
> >>>>      Default Address Selection for Internet Protocol Version 6 (IPv6)
> >>>> -
> >>>> +                ietf-draft-buraglio-rfc6724-update.txt
> >>>> Abstract
> >>>>
> >>>>     This document describes two algorithms, one for source address
> >>>> @@ -347,14 +347,14 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>        fec0::/10              1    11
> >>>>        3ffe::/16              1    12
> >>>>        fec0::/10              1    11
> >>>>        3ffe::/16              1    12
> >>>>
> >>>> -   An implementation MAY automatically add additional site-specific
> rows
> >>>> +   An implementation MUST automatically add additional site-specific
> rows
> >>>>     to the default table based on its configured addresses, such as
> for
> >>>>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056]
> addresses,
> >>>>     for instance (see Sections 10.6 and 10.7 for examples).  Any such
> >>>>     rows automatically added by the implementation as a result of
> address
> >>>>     acquisition MUST NOT override a row for the same prefix configured
> >>>>     via other means.  That is, rows can be added but never updated
> >>>> -   automatically.  An implementation SHOULD provide a means (the
> >>>> +   automatically.  An implementation MUST provide a means (the
> >>>>     Automatic Row Additions flag) for an administrator to disable
> >>>>     automatic row additions.
> >>>>
> >>>> @@ -363,7 +363,15 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>     addresses, 6to4 source addresses with 6to4 destination addresses,
> >>>>     etc.  Another effect of the default policy table is to prefer
> >>>>     communication using IPv6 addresses to communication using IPv4
> >>>> -   addresses, if matching source addresses are available.
> >>>> +   addresses, if matching source addresses are available.
> >>>> +
> >>>> +   This behavior is required for proper functioning of ULA
> addressing,
> >>>> +   thus preserving the preference of IPv6 over legacy IPv4 in dual
> stacked
> >>>> +   environments as detailed in draft-v6ops-ula. Additionally,
> requiring
> >>>> +   local site-specific addressing entry into all nodes preference
> list
> >>>> +   further scopes the network communication to local and remote per
> the
> >>>> +   respective addressing blocks and creates a more consistent
> operational
> >>>> +   model and user experience.
> >>>>
> >>>>     Policy table entries for address prefixes that are not of global
> >>>>     scope MAY be qualified with an optional zone index.  If so, a
> prefix
> >>>> @@ -1541,7 +1549,7 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>                     C., and M. Azinger, "IANA-Reserved IPv4 Prefix for
> >>>>                     Shared Address Space", BCP 153, RFC 6598, April
> 2012.
> >>>>
> >>>> -
> >>>> +
> >>>>
> >>>>
> >>>>
> >>>> @@ -1775,6 +1783,9 @@ Authors' Addresses
> >>>>
> >>>>
> >>>> ----
> >>>> nb
> >>>>
> >>>> On Tue, Sep 20, 2022 at 6:06 PM Tim Chown <tjc.ietf@gmail.com> wrote:
> >>>>>
> >>>>> Hi,
> >>>>>
> >>>>> As an author of RFC6724 I’ve had the discussions about a possible
> update of RFC6724 brought to my attention.
> >>>>>
> >>>>> An example thread over on v6ops is
> https://mailarchive.ietf.org/arch/msg/v6ops/W6HjHc11JX364soq3t3gFMHSawE/,
> but there are others.
> >>>>>
> >>>>> Nick Buraglio has documented the problem in
> draft-ietf-v6ops-ula-00.  The short of it is that RFC1918 IPv4 addresses
> may be preferred to IPv6 ULAs in certain circumstances, which I would agree
> is not desired behaviour.
> >>>>>
> >>>>> There are a few ways we might look to address this.  There is a
> proposal from Nick (not yet published outside a git repo) to address it by
> changing wording in section 2.1, with a couple of MAYs becoming MUSTs, and
> adding an extra explaining paragraph.  This basically firms up the
> requirement to follow 6.10 on adding an extra precedence line for local ULA
> prefix(es).
> >>>>>
> >>>>> Now, that may or may not be the preferred solution of the WG, but I
> think there’s a few questions to consider:
> >>>>>
> >>>>> 1. Is there agreement we should address the problem?  I’d assume so
> because Nick's problem draft was adopted by v6ops.
> >>>>>
> >>>>> 2. If so, is 6man the place to do it?  I think it has to be.
> RFC6724 was born here.
> >>>>>
> >>>>> 3. How do we determine the best solution to the problem?  I suspect
> there are nuances in play that will make a one size fit all ’simple’ fix
> tricky, but I look forward to the discussion.  Nick has one proposal that
> counts to a couple of word changes and an extra paragraph, which I’d
> encourage him to share here, but there are other approaches proposed on
> v6ops.  I think either way, it will require some update to or for RFC6724.
> >>>>>
> >>>>> 4. Does this work warrant a full -bis or would a separate RFC that
> updates 6724 be better?  A separate Updating draft might better highlight
> the issue to implementors.  But then RFC6724 is now ten years old, and
> RFC3484 which it replaced was nine years before that.
> >>>>>
> >>>>> 5. If we choose to open up a full -bis, are there any other worms in
> this can?  I have a feeling also here I know the likely answer….
> >>>>>
> >>>>> Anyway, over to the WG… thoughts?
> >>>>>
> >>>>> Tim
> >>>
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
> --
>
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
>