Re: RFC6724-bis?
Ted Lemon <mellon@fugue.com> Thu, 22 September 2022 19:56 UTC
Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCD7C14CF10 for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 12:56:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGYZ1IrekKpF for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 12:56:05 -0700 (PDT)
Received: from mail-oa1-x2e.google.com (mail-oa1-x2e.google.com [IPv6:2001:4860:4864:20::2e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE539C14CE28 for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:55:41 -0700 (PDT)
Received: by mail-oa1-x2e.google.com with SMTP id 586e51a60fabf-1225219ee46so15471809fac.2 for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:55:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=Am4cy6KtfYvnCefYe0cugAshVDxl73R0cbkiDj1Clck=; b=JPTeAOWAUaZj6pmdBilFS2q7KaKX2ETEBgQT1umVHWlevuGGv5/+G0d81lW45Wzliw yOjoivGVcVLRTTPs8Q+1S3I84Bcmbz4zaAI31fPnspF6yw5h3QpMILJdHlWEOODSb6nE VhNg0MAa/y8ZRdz7uzKP/u9jAYfszOEQFZacaybaq+HRdGmLxv9MdE0qdxxcBWPqlcqV 0hLdge6/76WEA67J3K8Lf7PyyvqxhMVhhXkDfVmxiF3ynGm9u+cgVJ+2yFzLEYTf9hU8 BiaVDEYKhr84bBxURsDE+EN7qdFjCZbyRGQaB94GaYOjeOED7CB+DF8MkrQa1hHQ0OQB h/8A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=Am4cy6KtfYvnCefYe0cugAshVDxl73R0cbkiDj1Clck=; b=pXqBIwd3uMR7IYIk4Rsmeit8cUnCFqvEAkgoKLmwkwJPQ4jPkGdTBWI06x6dgTark2 5XTCyxmc6C4mwqXe6O+Q8kkt3u2VVJmfho35/0Mcp9SH0uxRSkIqwai7+GOjRaPNBg82 J9X14viwq8/LTzlxNAK7g0CCszeboHArYGssB3V6ZJvqW5+QjvhV5YDdtIYlQsag7VC+ M5Q8us+NPb0R6Rva5CmV+RVGwd7k4+EL5/lKu3oORzVXv4sA/+RpUaM/ay5hZdYvdGen H+DDh68wgHOiK/Ari0PkGb0dk3GGt0yyfVoHvV4mDwjCpKomYFK7rU5WJFZPavi3eAzx JjWA==
X-Gm-Message-State: ACrzQf1dPP3bX/hXCtYiv0FyyDrxIrbPo2p+w4t2/OwrLAjDEzfdbpTl 5Htm6KCf8BVpHLJJGqK4+izHa3zm0CDwowHS8cYcCz+fVdc=
X-Google-Smtp-Source: AMsMyM7ajGMMN7JWprwnPqIV6rsZFIKz8GZ/wKlTHiyUOxPAXfNr2voQZ32irb1KfOkXCl+CDXjtopgHZKWaILBdu7E=
X-Received: by 2002:a05:6870:524b:b0:12c:cfd2:81c0 with SMTP id o11-20020a056870524b00b0012ccfd281c0mr2964349oai.209.1663876540321; Thu, 22 Sep 2022 12:55:40 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAM5+tA9kttCKrZaoB7UzNdE6TU1qGNMaxDmWvFtRvpB4A8+WHA@mail.gmail.com> <8FE71499-D155-4853-A964-6617F6EA2069@gmail.com> <CAM5+tA9QuYxVs+NXBD3dAYr_Y=95bWt63WjmEMDOfegL0Z4otA@mail.gmail.com> <CAM5+tA_hg2sXXsYw6Tcx-ytRAMkKQcFw8a3N7SfEXwbuPm0LMw@mail.gmail.com> <00ea3b70-ba8e-b6ef-e1ce-fdd56828f506@gmail.com> <CAPt1N1=_9Rwj-HnUZKWfatARbHWptArmSAV-qdi8MKyoBf9R0A@mail.gmail.com> <CAO42Z2xZ_-mDh66A9DK+3ieEqGMqW0Pt+mZzVOmzz4cDRUTEXA@mail.gmail.com> <CAPt1N1nqwMvVHvEGAx0jxgWhbW9ZUQfAZSDn-qRYQ0CDy-EGKQ@mail.gmail.com> <17a28c173ed640e68b1cbf504bbeae49@huawei.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com> <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com> <a7bb7709386b4c51b262d0664d81357e@huawei.com>
In-Reply-To: <a7bb7709386b4c51b262d0664d81357e@huawei.com>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 22 Sep 2022 15:55:04 -0400
Message-ID: <CAPt1N1kFGHRjuEJgi-z-Cfohjr5goAOXdxRGKK3rsP3r4xDZ+g@mail.gmail.com>
Subject: Re: RFC6724-bis?
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: David Farmer <farmer=40umn.edu@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000022e9ef05e9497298"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/AThe-82EZ8izFUPBUkQ1pN33iKE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 19:56:10 -0000
It's entirely valid to have a ULA configured locally that is not reachable remotely. And it is entirely reasonable for this to happen on a network on which a ULA is configured that is reachable from the network on which the more locally-scoped ULA is present. If you are lucky, you will get an ICMP destination unreachable based on your source address when a packet sourced from that ULA hits the edge of the ULA's scope of validity, but I think it's unreasonable to rely on the network doing this. That's more of a best case scenario, network admin gets a cookie kind of situation. I think a destination unreachable response is more likely when the /remote/ ULA is unreachable from the point of origin of the connection, but I still don't think that we should assume reachability, because even if the network administrator doesn't get a cookie in this situation, it's still quite likely that there are many networks where such a response will not occur. On Thu, Sep 22, 2022 at 1:47 PM Vasilenko Eduard < vasilenko.eduard@huawei.com> wrote: > I hope ULA in public DNS is not pointing to Google or something big. Then > why is it a problem if ULA is advertised for abcd.efgh.klmno.com? > > It is a problem only for this resource. Good luck to them. > > > > It would not be a problem for another organization till the organization > would increase precedence for FC/7 above GUA. > > > > Moreover, it is not a problem for another organization till the > organization would not activate ULA PIO inside, > > Because Rule 5: Prefer matching label would prefer GUA despite ULA and GUA received in the DNS. > > If no PIO – nothing to match for the source even if FC/7 is already the highest precedence. > > > > And only if the organization would activate ULA PIO, change FC/7 preference above GUA, and somebody requests abcd.efgh.klmno.com– then would be a problem. > > It looks pretty artificial situation. > > > > Then TCP would not receive ACK. In 300ms (old style HYv1) host would > switch to IPv4. > > HYv2 is faster (50ms) but supported only by Apple. > > > > Ed/ > > *From:* David Farmer [mailto:farmer=40umn.edu@dmarc.ietf.org] > *Sent:* Thursday, September 22, 2022 8:21 PM > *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com> > *Cc:* 6man WG <ipv6@ietf.org>; Ted Lemon <mellon@fugue.com> > *Subject:* Re: RFC6724-bis? > > > > Experience has shown us that despite recommendations to the contrary, ULAs > are in the Public DNS, how much is questionable, but it exists nonetheless. > > > > Further, using the converse to the argument that address collisions are a > very low probability event, if ULA prefixes are randomly selected, as > recommended in RFC 4193; therefore, any such randomly selected ULA prefix > learned from the DNS is going to have a very high probability that it is > unreachable. This is why, we shouldn’t prefer ULA address unless there is > knowledge the ULA prefix is actually locally connected. > > > > It’s worth repeating, unless a ULA prefix is know to be locally connected, > there is a very high probability that any connections to it will simply > fail. > > > > Now I have some related questions, is this connection failure going to > result in a full TCP timeout or happy eyeballs timer expiring? Or, will an > ICMP destination unreachable or other ICMP message shortcut the TCP timeout > or the happy eyeballs timer? Will most CPEs on the market generate an ICMP > destination unreachable, an ICMP administratively disallowed, or simply > just forward the packet to the upstream ISP using the default route? Would > most ISPs generate an ICMP destination unreachable for the ULA in this > case? Finally, even if the ISP’s router generates the ICMP destination > unreachable, in most cases, I don’t believe the ISP will have a route back > to the originating ULA address anyway. > > > > So, I think we are probably better off with SA/DA selection not preferring > ULA unless the prefix is know to be local. This is the best guess. > > > > Thanks. > > > > On Thu, Sep 22, 2022 at 11:05 Vasilenko Eduard <vasilenko.eduard= > 40huawei.com@dmarc.ietf.org> wrote: > > I hope DNS advertising ULA is not foreign. Problem solved. > > If the organization is using many ULA prefixes – they should be > distributed everywhere, > > Or DNS should announce different views for different company regions. > > > > You are looking for the solution for the configuration inconsistency: DNS > has announced something but routing is not available. > > Ed/ > > *From:* Ted Lemon [mailto:mellon@fugue.com] > *Sent:* Thursday, September 22, 2022 6:54 PM > *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com> > *Cc:* Mark Smith <markzzzsmith@gmail.com>; 6man WG <ipv6@ietf.org> > *Subject:* Re: RFC6724-bis? > > > > If I have a GUA and no ULA, and I get a ULA, I'm going to guess that I > should use the GUA because I have no choice. If I have a GUA and a ULA, and > I see a foreign ULA, longest match will choose the ULA, not the GUA, but > there is no guarantee that the ULA is reachable from the foreign ULA. So > no, longest match isn't actually going to reliably guess right here. > Practically speaking, in this case using the GUA is always better, because > even if my ULA happens to be reachable from the device with the foreign > ULA, the GUA will still also work. > > > > On Thu, Sep 22, 2022 at 11:50 AM Vasilenko Eduard < > vasilenko.eduard@huawei.com> wrote: > > The longest match helps to choose what is local > > It is rule 8 in RFC 6724. > > Already works. > > Ed/ > > *From:* ipv6 [mailto:ipv6-bounces@ietf.org] *On Behalf Of *Ted Lemon > *Sent:* Thursday, September 22, 2022 6:35 PM > *To:* Mark Smith <markzzzsmith@gmail.com> > *Cc:* 6man WG <ipv6@ietf.org> > *Subject:* Re: RFC6724-bis? > > > > Still, a local ULA can be presumed reachable, whereas a ULA that is not > configured locally may or may not be reachable. Ideally we want to try the > thing that will work first. And we’ve actually seen non-local ULAs fail in > the wild. So while doing happy eyeballs is a great way to avoid failing > when your best guess is wrong, making better guesses is still good. > > > > Op do 22 sep. 2022 om 11:30 schreef Mark Smith <markzzzsmith@gmail.com> > > > > On Thu, 22 Sept 2022, 20:38 Ted Lemon, <mellon@fugue.com> wrote: > > Wouldn’t increasing the ULA priority have the problem that we’d get > longest match wins on alien ULAs though? I think that was why the “add > local ULAs to the table” rule was originally proposed. > > > > Why is do people think the static default DA/SA selection will always > accurately choose the best outcome for a dynamic network? > > > > The set of answers from DA/SA selection are supposed to be tested until > one of them succeeds. > > > > A ULA response in a DNS RR should be the best answer most of the time, > however sometimes the alternative GUA will be better and be successful. > > > > That is, try the ULA destination, and if that fails, try the GUA DA, when > both are provided in a DNS response. > > > > A static algorithm like default DA/SA selection is sometimes going to be > wrong when being applied to a dynamic situation. > > > > Regards, > > Mark. > > > > > > Local ULAs might also be discovered through mDNS, which is I pretty much > ubiquitous on home networks. > > > > Op do 22 sep. 2022 om 01:25 schreef Brian E Carpenter < > brian.e.carpenter@gmail.com> > > I agree with Bob that a stand-alone draft (Updates: 6724) is probably > a simpler approach than re-opening the whole RFC to comments. > > Apart from that, the proto-draft says: > > An implementation MUST automatically add additional site-specific rows > to the default table based on its configured addresses, such as for > Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] addresses, > for instance (see Sections 10.6 and 10.7 for examples). > > That doesn't really compute, because 6to4 is pretty much ancient history. > If we make a change of this kind, I think it should be specific to ULAs. > And if we want to make the section 10.6 behaviour mandatory, I think we'd > want the wording to be precise (with an explicit description of the > algorithm the kernel should use). > > We should also, I think, state clearly that the expectation is that ULAs > will normally be discovered via split-horizon DNS, or some other local > discovery mechanism (e.g. the one in GRASP [RFC8990]). > > The other question is: would it be sufficient to do something much simpler, > i.e., simply boost the ULA prefix in the default policy table and all > examples: > > fc00::/7 31 13 > > Where's the harm in that? It will mean that ULAs are picked by the > longest match rule when they are present. That won't happen unless > there *are* ULAs, so it has precisely zero impact on sites that don't > use them. > > It does no harm to add higher precedence for locally defined ULAs, but > I am not convinced it's useful either, in the normal case. > > The proto-draft also says: > > This behavior is required for proper functioning of ULA addressing, > thus preserving the preference of IPv6 over legacy IPv4 in dual stacked > environments as detailed in draft-v6ops-ula. Additionally, requiring > local site-specific addressing entry into all nodes preference list > further scopes the network communication to local and remote per the > respective addressing blocks and creates a more consistent operational > model and user experience. > > I agree with the statement, but it would sit more naturally in a > stand-alone update than as a patch on RFC6724. > > Regards > Brian > > On 21-Sep-22 20:47, Nick Buraglio wrote: > > I've gotten some feedback that the diff is hard to read because of the > > formatting, so here is a link to the proposal. Please bear in mind > > that this is *very* crude and was meant to simply track the idea. > > https://github.com/buraglio/ietf-draft-buraglio-rfc6724-update > > > > ---- > > nb > > > > On Wed, Sep 21, 2022 at 10:29 AM Nick Buraglio <buraglio@es.net> wrote: > >> > >> Totally agree - this is just a starting point. I am happy to work on > >> whatever the group feels is the right approach and what we feel will > >> reach consensus. > >> > >> ---- > >> nb > >> > >> On Wed, Sep 21, 2022 at 10:25 AM Tim Chown <tjc.ietf@gmail.com> wrote: > >>> > >>> Thanks Nick. > >>> > >>> I think the aim here is to see if the WG can get consensus on an > approach to address the problem, and document that for consideration for WG > adoption. Nick has diffs below to 6724, but it could be a short standalone > document the updates 6724. > >>> > >>> Tim > >>> > >>>> On 21 Sep 2022, at 09:02, Nick Buraglio <buraglio@es.net> wrote: > >>>> > >>>> The changes that I had proposed in my github repo are below, these are > >>>> just a starting point, I welcome any and all input. > >>>> > >>>> > >>>> > >>>> @@ -12,7 +12,7 @@ ISSN: 2070-1721 > >>>> A. Matsumoto > >>>> > >>>> > >>>> Default Address Selection for Internet Protocol Version 6 (IPv6) > >>>> - > >>>> + ietf-draft-buraglio-rfc6724-update.txt > >>>> Abstract > >>>> > >>>> This document describes two algorithms, one for source address > >>>> @@ -347,14 +347,14 @@ RFC 6724 Default Address Selection for > >>>> IPv6 September 2012 > >>>> fec0::/10 1 11 > >>>> 3ffe::/16 1 12 > >>>> fec0::/10 1 11 > >>>> 3ffe::/16 1 12 > >>>> > >>>> - An implementation MAY automatically add additional site-specific > rows > >>>> + An implementation MUST automatically add additional site-specific > rows > >>>> to the default table based on its configured addresses, such as > for > >>>> Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] > addresses, > >>>> for instance (see Sections 10.6 and 10.7 for examples). Any such > >>>> rows automatically added by the implementation as a result of > address > >>>> acquisition MUST NOT override a row for the same prefix configured > >>>> via other means. That is, rows can be added but never updated > >>>> - automatically. An implementation SHOULD provide a means (the > >>>> + automatically. An implementation MUST provide a means (the > >>>> Automatic Row Additions flag) for an administrator to disable > >>>> automatic row additions. > >>>> > >>>> @@ -363,7 +363,15 @@ RFC 6724 Default Address Selection for > >>>> IPv6 September 2012 > >>>> addresses, 6to4 source addresses with 6to4 destination addresses, > >>>> etc. Another effect of the default policy table is to prefer > >>>> communication using IPv6 addresses to communication using IPv4 > >>>> - addresses, if matching source addresses are available. > >>>> + addresses, if matching source addresses are available. > >>>> + > >>>> + This behavior is required for proper functioning of ULA > addressing, > >>>> + thus preserving the preference of IPv6 over legacy IPv4 in dual > stacked > >>>> + environments as detailed in draft-v6ops-ula. Additionally, > requiring > >>>> + local site-specific addressing entry into all nodes preference > list > >>>> + further scopes the network communication to local and remote per > the > >>>> + respective addressing blocks and creates a more consistent > operational > >>>> + model and user experience. > >>>> > >>>> Policy table entries for address prefixes that are not of global > >>>> scope MAY be qualified with an optional zone index. If so, a > prefix > >>>> @@ -1541,7 +1549,7 @@ RFC 6724 Default Address Selection for > >>>> IPv6 September 2012 > >>>> C., and M. Azinger, "IANA-Reserved IPv4 Prefix for > >>>> Shared Address Space", BCP 153, RFC 6598, April > 2012. > >>>> > >>>> - > >>>> + > >>>> > >>>> > >>>> > >>>> @@ -1775,6 +1783,9 @@ Authors' Addresses > >>>> > >>>> > >>>> ---- > >>>> nb > >>>> > >>>> On Tue, Sep 20, 2022 at 6:06 PM Tim Chown <tjc.ietf@gmail.com> wrote: > >>>>> > >>>>> Hi, > >>>>> > >>>>> As an author of RFC6724 I’ve had the discussions about a possible > update of RFC6724 brought to my attention. > >>>>> > >>>>> An example thread over on v6ops is > https://mailarchive.ietf.org/arch/msg/v6ops/W6HjHc11JX364soq3t3gFMHSawE/, > but there are others. > >>>>> > >>>>> Nick Buraglio has documented the problem in > draft-ietf-v6ops-ula-00. The short of it is that RFC1918 IPv4 addresses > may be preferred to IPv6 ULAs in certain circumstances, which I would agree > is not desired behaviour. > >>>>> > >>>>> There are a few ways we might look to address this. There is a > proposal from Nick (not yet published outside a git repo) to address it by > changing wording in section 2.1, with a couple of MAYs becoming MUSTs, and > adding an extra explaining paragraph. This basically firms up the > requirement to follow 6.10 on adding an extra precedence line for local ULA > prefix(es). > >>>>> > >>>>> Now, that may or may not be the preferred solution of the WG, but I > think there’s a few questions to consider: > >>>>> > >>>>> 1. Is there agreement we should address the problem? I’d assume so > because Nick's problem draft was adopted by v6ops. > >>>>> > >>>>> 2. If so, is 6man the place to do it? I think it has to be. > RFC6724 was born here. > >>>>> > >>>>> 3. How do we determine the best solution to the problem? I suspect > there are nuances in play that will make a one size fit all ’simple’ fix > tricky, but I look forward to the discussion. Nick has one proposal that > counts to a couple of word changes and an extra paragraph, which I’d > encourage him to share here, but there are other approaches proposed on > v6ops. I think either way, it will require some update to or for RFC6724. > >>>>> > >>>>> 4. Does this work warrant a full -bis or would a separate RFC that > updates 6724 be better? A separate Updating draft might better highlight > the issue to implementors. But then RFC6724 is now ten years old, and > RFC3484 which it replaced was nine years before that. > >>>>> > >>>>> 5. If we choose to open up a full -bis, are there any other worms in > this can? I have a feeling also here I know the likely answer…. > >>>>> > >>>>> Anyway, over to the WG… thoughts? > >>>>> > >>>>> Tim > >>> > > > > -------------------------------------------------------------------- > > IETF IPv6 working group mailing list > > ipv6@ietf.org > > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > > -------------------------------------------------------------------- > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- > > -- > > =============================================== > David Farmer Email:farmer@umn.edu > Networking & Telecommunication Services > Office of Information Technology > University of Minnesota > 2218 University Ave SE Phone: 612-626-0815 > Minneapolis, MN 55414-3029 Cell: 612-812-9952 > =============================================== >
- RFC6724-bis? Tim Chown
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Tim Chown
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Bob Hinden
- Re: RFC6724-bis? Brian E Carpenter
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Mark Smith
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Michael Richardson
- Re: RFC6724-bis? David Farmer
- RE: RFC6724-bis? Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Michael Richardson
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Mark Smith
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? David Farmer
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Brian E Carpenter
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? David Farmer
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? David Farmer
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Brian E Carpenter
- Re: RFC6724-bis? Nick Buraglio
- Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- RE: RFC6724-bis? Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Nick Buraglio
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Mark Smith
- Re: Network merge [Re: RFC6724-bis?] Ted Lemon
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Mark Smith
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- RE: Network merge [Re: RFC6724-bis?] Vasilenko Eduard
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Timothy Winters
- Re: Network merge [Re: RFC6724-bis?] Nick Buraglio
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] Brian Carpenter
- Re: Network merge [Re: RFC6724-bis?] Ole Troan
- Re: Network merge [Re: RFC6724-bis?] David Farmer
- Re: Network merge [Re: RFC6724-bis?] Brian E Carpenter
- Re: Network merge [Re: RFC6724-bis?] Michael Richardson
- Re: Network merge [Re: RFC6724-bis?] Ted Lemon
- RE: RFC6724-bis? Vasilenko Eduard
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Ted Lemon
- Re: RFC6724-bis? Nick Buraglio
- Re: RFC6724-bis? Michael Richardson