Re: RFC6724-bis?

David Farmer <farmer@umn.edu> Thu, 22 September 2022 17:21 UTC

Return-Path: <farmer@umn.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 331A4C1522D5 for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 10:21:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umn.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qtxg9Mf7V9SN for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 10:21:33 -0700 (PDT)
Received: from mta-p5.oit.umn.edu (mta-p5.oit.umn.edu [134.84.196.205]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D816BC14F745 for <ipv6@ietf.org>; Thu, 22 Sep 2022 10:21:31 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mta-p5.oit.umn.edu (Postfix) with ESMTP id 4MYMWv1ShLz9yT9W for <ipv6@ietf.org>; Thu, 22 Sep 2022 17:21:31 +0000 (UTC)
X-Virus-Scanned: amavisd-new at umn.edu
Received: from mta-p5.oit.umn.edu ([127.0.0.1]) by localhost (mta-p5.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pfCxLtrIinwn for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:21:30 -0500 (CDT)
Received: from mail-ej1-f69.google.com (mail-ej1-f69.google.com [209.85.218.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p5.oit.umn.edu (Postfix) with ESMTPS id 4MYMWt2fqdz9yT9h for <ipv6@ietf.org>; Thu, 22 Sep 2022 12:21:30 -0500 (CDT)
DMARC-Filter: OpenDMARC Filter v1.3.2 mta-p5.oit.umn.edu 4MYMWt2fqdz9yT9h
DKIM-Filter: OpenDKIM Filter v2.11.0 mta-p5.oit.umn.edu 4MYMWt2fqdz9yT9h
Received: by mail-ej1-f69.google.com with SMTP id oz30-20020a1709077d9e00b0077239b6a915so4819993ejc.11 for <ipv6@ietf.org>; Thu, 22 Sep 2022 10:21:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=wswuo5Ar/73nhZXfGUOFNfgmmGFqEkPg6ujqUfKrHIQ=; b=lxX6r4GGAfhEo2n6cyEjPYPaR0VLrs484b35kTZG7p7fh6/VqRiQdo8sX4SdXSeZMF A16idI7XtlwIIXZJ6EccqDmdElBPmolHRhMWNRYd6gdTp9ne+rJ5nQQDQvnHqzeirUIv vpnieeqnIbQ70vfrwua5eWH+DWMPyS0oBHZ7IxQSeNn2/c/cNghmsILXCL+VWkp5ZCNM A7zfUJ0ahphgp0O69AnOD2mb/E8hsfybZhZ0kOas41KF+x097JuxO6ulQ2utJyaoWY1E xGHb+2Sgz7DMraDRzV+4/K3tUIFrgPvBGBpHw3oKlYKOHlYWNSAHPHcqKMHKUxNlQTZT iADQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=wswuo5Ar/73nhZXfGUOFNfgmmGFqEkPg6ujqUfKrHIQ=; b=pkvaBjLcsRg6grCdzbvJq44LStCjkVC4+K0kLXMHdf1bWXzpoI6ReLRRMMzLyoSa0o ajy9ESp6abEvugO1UMoyPjtc6IRlSdH+gonyPWuixwIBxhTCq2JixpjmD2DOY7LDEqx8 YbGhw3lgdIPKezzWDyDNVcvcZvBVhTpT+8mtwH7Q6AGCyWxQfQ55wnDABVqj+xG+PZhU WSqg31pJykP565uAvoyWAsVoghqar/VcHkTh3sAt0TWNRUMXBB45zl9e86eCxFnAxdOC lZ19RJe22bF88aJ3rkqdsA3f3rs6gLvrrrk0e6lQwI3gUl5Jz0IbfleLyJOPzpVIYkFd j0xQ==
X-Gm-Message-State: ACrzQf3s8NLTjq3kRw16gZin/DZcxTEXhlEhwlOefAaKanIBAGQu8NXI P3KXn87B+tZoYZqBWj4F8YH5yX5DbF13P2hVCoWUmNUnPNo3O6S25lw6WcvC2R+wK9B5QcwW/Qi EWy0Lihg+Q4U1KT/D6sRv9Ktq
X-Received: by 2002:a17:906:ef90:b0:77c:7227:705 with SMTP id ze16-20020a170906ef9000b0077c72270705mr3615366ejb.565.1663867288564; Thu, 22 Sep 2022 10:21:28 -0700 (PDT)
X-Google-Smtp-Source: AMsMyM5FEgt+BvdpK3RqduPO1nk6WIhlb2P1/rU3ZPsiAkhnVKKOG5DetLPXn46qoqriuXMeubiBtr843gUb+iEuUQ8=
X-Received: by 2002:a17:906:ef90:b0:77c:7227:705 with SMTP id ze16-20020a170906ef9000b0077c72270705mr3615335ejb.565.1663867288147; Thu, 22 Sep 2022 10:21:28 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAM5+tA9kttCKrZaoB7UzNdE6TU1qGNMaxDmWvFtRvpB4A8+WHA@mail.gmail.com> <8FE71499-D155-4853-A964-6617F6EA2069@gmail.com> <CAM5+tA9QuYxVs+NXBD3dAYr_Y=95bWt63WjmEMDOfegL0Z4otA@mail.gmail.com> <CAM5+tA_hg2sXXsYw6Tcx-ytRAMkKQcFw8a3N7SfEXwbuPm0LMw@mail.gmail.com> <00ea3b70-ba8e-b6ef-e1ce-fdd56828f506@gmail.com> <CAPt1N1=_9Rwj-HnUZKWfatARbHWptArmSAV-qdi8MKyoBf9R0A@mail.gmail.com> <CAO42Z2xZ_-mDh66A9DK+3ieEqGMqW0Pt+mZzVOmzz4cDRUTEXA@mail.gmail.com> <CAPt1N1nqwMvVHvEGAx0jxgWhbW9ZUQfAZSDn-qRYQ0CDy-EGKQ@mail.gmail.com> <17a28c173ed640e68b1cbf504bbeae49@huawei.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com>
In-Reply-To: <e76267b6101146cf8a1bd6fa567c6b77@huawei.com>
From: David Farmer <farmer@umn.edu>
Date: Thu, 22 Sep 2022 12:21:16 -0500
Message-ID: <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com>
Subject: Re: RFC6724-bis?
To: Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
Cc: 6man WG <ipv6@ietf.org>, Ted Lemon <mellon@fugue.com>
Content-Type: multipart/alternative; boundary="000000000000a9f12905e9474a3b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/EUdWWmpeJ8KIgTU2WBHqKlRi2yQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 17:21:37 -0000

Experience has shown us that despite recommendations to the contrary, ULAs
are in the Public DNS, how much is questionable, but it exists nonetheless.

Further, using the converse to the argument that address collisions are a
very low probability event, if ULA prefixes are randomly selected, as
recommended in RFC 4193; therefore, any such randomly selected ULA prefix
learned from the DNS is going to have a very high probability that it is
unreachable. This is why, we shouldn’t prefer ULA address unless there is
knowledge the ULA prefix is actually locally connected.

It’s worth repeating, unless a ULA prefix is know to be locally connected,
there is a very high probability that any connections to it will simply
fail.

Now I have some related questions, is this connection failure going to
result in a full TCP timeout or happy eyeballs timer expiring? Or, will an
ICMP destination unreachable or other ICMP message shortcut the TCP timeout
or the happy eyeballs timer? Will most CPEs on the market generate an ICMP
destination unreachable, an ICMP administratively disallowed, or simply
just forward the packet to the upstream ISP using the default route? Would
most ISPs generate an ICMP destination unreachable for the ULA in this
case? Finally, even if the ISP’s router generates the ICMP destination
unreachable, in most cases, I don’t believe the ISP will have a route back
to the originating ULA address anyway.

So, I think we are probably better off with SA/DA selection not preferring
ULA unless the prefix is know to be local.  This is the best guess.

Thanks.

On Thu, Sep 22, 2022 at 11:05 Vasilenko Eduard <vasilenko.eduard=
40huawei.com@dmarc.ietf.org> wrote:

> I hope DNS advertising ULA is not foreign. Problem solved.
>
> If the organization is using many ULA prefixes – they should be
> distributed everywhere,
>
> Or DNS should announce different views for different company regions.
>
>
>
> You are looking for the solution for the configuration inconsistency: DNS
> has announced something but routing is not available.
>
> Ed/
>
> *From:* Ted Lemon [mailto:mellon@fugue.com]
> *Sent:* Thursday, September 22, 2022 6:54 PM
> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
> *Cc:* Mark Smith <markzzzsmith@gmail.com>; 6man WG <ipv6@ietf.org>
> *Subject:* Re: RFC6724-bis?
>
>
>
> If I have a GUA and no ULA, and I get a ULA, I'm going to guess that I
> should use the GUA because I have no choice. If I have a GUA and a ULA, and
> I see a foreign ULA, longest match will choose the ULA, not the GUA, but
> there is no guarantee that the ULA is reachable from the foreign ULA. So
> no, longest match isn't actually going to reliably guess right here.
> Practically speaking, in this case using the GUA is always better, because
> even if my ULA happens to be reachable from the device with the foreign
> ULA, the GUA will still also work.
>
>
>
> On Thu, Sep 22, 2022 at 11:50 AM Vasilenko Eduard <
> vasilenko.eduard@huawei.com> wrote:
>
> The longest match helps to choose what is local
>
> It is rule 8 in RFC 6724.
>
> Already works.
>
> Ed/
>
> *From:* ipv6 [mailto:ipv6-bounces@ietf.org] *On Behalf Of *Ted Lemon
> *Sent:* Thursday, September 22, 2022 6:35 PM
> *To:* Mark Smith <markzzzsmith@gmail.com>
> *Cc:* 6man WG <ipv6@ietf.org>
> *Subject:* Re: RFC6724-bis?
>
>
>
> Still, a local ULA can be presumed reachable, whereas a ULA that is not
> configured locally may or may not be reachable. Ideally we want to try the
> thing that will work first. And we’ve actually seen non-local ULAs fail in
> the wild. So while doing happy eyeballs is a great way to avoid failing
> when your best guess is wrong, making better guesses is still good.
>
>
>
> Op do 22 sep. 2022 om 11:30 schreef Mark Smith <markzzzsmith@gmail.com>
>
>
>
> On Thu, 22 Sept 2022, 20:38 Ted Lemon, <mellon@fugue.com> wrote:
>
> Wouldn’t increasing the ULA priority have the problem that we’d get
> longest match wins on alien ULAs though?  I think that was why the “add
> local ULAs to the table” rule was originally proposed.
>
>
>
> Why is do people think the static default DA/SA selection will always
> accurately choose the best outcome for a dynamic network?
>
>
>
> The set of answers from DA/SA selection are supposed to be tested until
> one of them succeeds.
>
>
>
> A ULA response in a DNS RR should be the best answer most of the time,
> however sometimes the alternative GUA will be better and be successful.
>
>
>
> That is, try the ULA destination, and if that fails, try the GUA DA, when
> both are provided in a DNS response.
>
>
>
> A static algorithm like default DA/SA selection is sometimes going to be
> wrong when being applied to a dynamic situation.
>
>
>
> Regards,
>
> Mark.
>
>
>
>
>
> Local ULAs might also be discovered through mDNS, which is I pretty much
> ubiquitous on home networks.
>
>
>
> Op do 22 sep. 2022 om 01:25 schreef Brian E Carpenter <
> brian.e.carpenter@gmail.com>
>
> I agree with Bob that a stand-alone draft (Updates: 6724) is probably
> a simpler approach than re-opening the whole RFC to comments.
>
> Apart from that, the proto-draft says:
>
>     An implementation MUST automatically add additional site-specific rows
>     to the default table based on its configured addresses, such as for
>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] addresses,
>     for instance (see Sections 10.6 and 10.7 for examples).
>
> That doesn't really compute, because 6to4 is pretty much ancient history.
> If we make a change of this kind, I think it should be specific to ULAs.
> And if we want to make the section 10.6 behaviour mandatory, I think we'd
> want the wording to be precise (with an explicit description of the
> algorithm the kernel should use).
>
> We should also, I think, state clearly that the expectation is that ULAs
> will normally be discovered via split-horizon DNS, or some other local
> discovery mechanism (e.g. the one in GRASP [RFC8990]).
>
> The other question is: would it be sufficient to do something much simpler,
> i.e., simply boost the ULA prefix in the default policy table and all
> examples:
>
>       fc00::/7              31    13
>
> Where's the harm in that? It will mean that ULAs are picked by the
> longest match rule when they are present. That won't happen unless
> there *are* ULAs, so it has precisely zero impact on sites that don't
> use them.
>
> It does no harm to add higher precedence for locally defined ULAs, but
> I am not convinced it's useful either, in the normal case.
>
> The proto-draft also says:
>
>     This behavior is required for proper functioning of ULA addressing,
>     thus preserving the preference of IPv6 over legacy IPv4 in dual stacked
>     environments as detailed in draft-v6ops-ula. Additionally, requiring
>     local site-specific addressing entry into all nodes preference list
>     further scopes the network communication to local and remote per the
>     respective addressing blocks and creates a more consistent operational
>     model and user experience.
>
> I agree with the statement, but it would sit more naturally in a
> stand-alone update than as a patch on RFC6724.
>
> Regards
>     Brian
>
> On 21-Sep-22 20:47, Nick Buraglio wrote:
> > I've gotten some feedback that the diff is hard to read because of the
> > formatting, so here is a link to the proposal. Please bear in mind
> > that this is *very* crude and was meant to simply track the idea.
> > https://github.com/buraglio/ietf-draft-buraglio-rfc6724-update
> >
> > ----
> > nb
> >
> > On Wed, Sep 21, 2022 at 10:29 AM Nick Buraglio <buraglio@es.net> wrote:
> >>
> >> Totally agree - this is just a starting point. I am happy to work on
> >> whatever the group feels is the right approach and what we feel will
> >> reach consensus.
> >>
> >> ----
> >> nb
> >>
> >> On Wed, Sep 21, 2022 at 10:25 AM Tim Chown <tjc.ietf@gmail.com> wrote:
> >>>
> >>> Thanks Nick.
> >>>
> >>> I think the aim here is to see if the WG can get consensus on an
> approach to address the problem, and document that for consideration for WG
> adoption.  Nick has diffs below to 6724, but it could be a short standalone
> document the updates 6724.
> >>>
> >>> Tim
> >>>
> >>>> On 21 Sep 2022, at 09:02, Nick Buraglio <buraglio@es.net> wrote:
> >>>>
> >>>> The changes that I had proposed in my github repo are below, these are
> >>>> just a starting point, I welcome any and all input.
> >>>>
> >>>>
> >>>>
> >>>> @@ -12,7 +12,7 @@ ISSN: 2070-1721
> >>>>        A. Matsumoto
> >>>>
> >>>>
> >>>>      Default Address Selection for Internet Protocol Version 6 (IPv6)
> >>>> -
> >>>> +                ietf-draft-buraglio-rfc6724-update.txt
> >>>> Abstract
> >>>>
> >>>>     This document describes two algorithms, one for source address
> >>>> @@ -347,14 +347,14 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>        fec0::/10              1    11
> >>>>        3ffe::/16              1    12
> >>>>        fec0::/10              1    11
> >>>>        3ffe::/16              1    12
> >>>>
> >>>> -   An implementation MAY automatically add additional site-specific
> rows
> >>>> +   An implementation MUST automatically add additional site-specific
> rows
> >>>>     to the default table based on its configured addresses, such as
> for
> >>>>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056]
> addresses,
> >>>>     for instance (see Sections 10.6 and 10.7 for examples).  Any such
> >>>>     rows automatically added by the implementation as a result of
> address
> >>>>     acquisition MUST NOT override a row for the same prefix configured
> >>>>     via other means.  That is, rows can be added but never updated
> >>>> -   automatically.  An implementation SHOULD provide a means (the
> >>>> +   automatically.  An implementation MUST provide a means (the
> >>>>     Automatic Row Additions flag) for an administrator to disable
> >>>>     automatic row additions.
> >>>>
> >>>> @@ -363,7 +363,15 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>     addresses, 6to4 source addresses with 6to4 destination addresses,
> >>>>     etc.  Another effect of the default policy table is to prefer
> >>>>     communication using IPv6 addresses to communication using IPv4
> >>>> -   addresses, if matching source addresses are available.
> >>>> +   addresses, if matching source addresses are available.
> >>>> +
> >>>> +   This behavior is required for proper functioning of ULA
> addressing,
> >>>> +   thus preserving the preference of IPv6 over legacy IPv4 in dual
> stacked
> >>>> +   environments as detailed in draft-v6ops-ula. Additionally,
> requiring
> >>>> +   local site-specific addressing entry into all nodes preference
> list
> >>>> +   further scopes the network communication to local and remote per
> the
> >>>> +   respective addressing blocks and creates a more consistent
> operational
> >>>> +   model and user experience.
> >>>>
> >>>>     Policy table entries for address prefixes that are not of global
> >>>>     scope MAY be qualified with an optional zone index.  If so, a
> prefix
> >>>> @@ -1541,7 +1549,7 @@ RFC 6724           Default Address Selection for
> >>>> IPv6     September 2012
> >>>>                     C., and M. Azinger, "IANA-Reserved IPv4 Prefix for
> >>>>                     Shared Address Space", BCP 153, RFC 6598, April
> 2012.
> >>>>
> >>>> -
> >>>> +
> >>>>
> >>>>
> >>>>
> >>>> @@ -1775,6 +1783,9 @@ Authors' Addresses
> >>>>
> >>>>
> >>>> ----
> >>>> nb
> >>>>
> >>>> On Tue, Sep 20, 2022 at 6:06 PM Tim Chown <tjc.ietf@gmail.com> wrote:
> >>>>>
> >>>>> Hi,
> >>>>>
> >>>>> As an author of RFC6724 I’ve had the discussions about a possible
> update of RFC6724 brought to my attention.
> >>>>>
> >>>>> An example thread over on v6ops is
> https://mailarchive.ietf.org/arch/msg/v6ops/W6HjHc11JX364soq3t3gFMHSawE/,
> but there are others.
> >>>>>
> >>>>> Nick Buraglio has documented the problem in
> draft-ietf-v6ops-ula-00.  The short of it is that RFC1918 IPv4 addresses
> may be preferred to IPv6 ULAs in certain circumstances, which I would agree
> is not desired behaviour.
> >>>>>
> >>>>> There are a few ways we might look to address this.  There is a
> proposal from Nick (not yet published outside a git repo) to address it by
> changing wording in section 2.1, with a couple of MAYs becoming MUSTs, and
> adding an extra explaining paragraph.  This basically firms up the
> requirement to follow 6.10 on adding an extra precedence line for local ULA
> prefix(es).
> >>>>>
> >>>>> Now, that may or may not be the preferred solution of the WG, but I
> think there’s a few questions to consider:
> >>>>>
> >>>>> 1. Is there agreement we should address the problem?  I’d assume so
> because Nick's problem draft was adopted by v6ops.
> >>>>>
> >>>>> 2. If so, is 6man the place to do it?  I think it has to be.
> RFC6724 was born here.
> >>>>>
> >>>>> 3. How do we determine the best solution to the problem?  I suspect
> there are nuances in play that will make a one size fit all ’simple’ fix
> tricky, but I look forward to the discussion.  Nick has one proposal that
> counts to a couple of word changes and an extra paragraph, which I’d
> encourage him to share here, but there are other approaches proposed on
> v6ops.  I think either way, it will require some update to or for RFC6724.
> >>>>>
> >>>>> 4. Does this work warrant a full -bis or would a separate RFC that
> updates 6724 be better?  A separate Updating draft might better highlight
> the issue to implementors.  But then RFC6724 is now ten years old, and
> RFC3484 which it replaced was nine years before that.
> >>>>>
> >>>>> 5. If we choose to open up a full -bis, are there any other worms in
> this can?  I have a feeling also here I know the likely answer….
> >>>>>
> >>>>> Anyway, over to the WG… thoughts?
> >>>>>
> >>>>> Tim
> >>>
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
-- 
===============================================
David Farmer               Email:farmer@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================