Re: RFC6724-bis?

Ted Lemon <mellon@fugue.com> Fri, 23 September 2022 00:03 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AAFBC1522CC for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 17:03:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KHfmWHw562pA for <ipv6@ietfa.amsl.com>; Thu, 22 Sep 2022 17:03:42 -0700 (PDT)
Received: from mail-oa1-x34.google.com (mail-oa1-x34.google.com [IPv6:2001:4860:4864:20::34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 384BCC14CE37 for <ipv6@ietf.org>; Thu, 22 Sep 2022 17:03:34 -0700 (PDT)
Received: by mail-oa1-x34.google.com with SMTP id 586e51a60fabf-1280590722dso16244767fac.1 for <ipv6@ietf.org>; Thu, 22 Sep 2022 17:03:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=O09nww1DWSjw0tCsQe+dbymJi/kG3dDMKQKe+f+C/9s=; b=DhFAJb4E7HQRPGikr6krSLp11D0tq88x/BAvnFl8YjZl3dzvP4LYiI1GT5jX3oIWJ6 pPk6sJUEtb+AKyaa/wHZT4cplgMIFbmBVjpuy9BXD+VbZQf0YEyMMD3940d4fM/arSfw BUMFDbF9OuIlYnImWBPk34V9E0DRt13gWPuyCQRXuIrsNh0lyc1kvdbrNtJ+v+zFoZWO lxsSbd7r3sFjvo8RlnlpADKJav2S91mYwqUlngVue7OBPzs+uCoJeCXsY2UOjMPT3Ixx cm+fDVs6scPk1pwILr+c5d5kjyiNLGgAE50axJxByfMdxcwYOHi3h1oEBQItMBzoArPj zC2A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=O09nww1DWSjw0tCsQe+dbymJi/kG3dDMKQKe+f+C/9s=; b=SK9YZOwpkFcrxvs8PGxHkFzyIBFLfE2ohVOFJV+XnntgAhCKQaZoBJYF7p5JbRPB0K bAYrqVcWzCZuuHIvC6t0yAcaP2YOgXFb2PBK1fblMuDjeCfukGDaOjlUVyQmnd7PeaBH tpf0ARfbmiL8pHFJLfaNuIcsDWhVQK+yOfzv3vdnwClXfSLzgj4ELKOwdPfPQsYiU6cO Z2jdKIOVnlIzFTdO706aoF9Y79avSRYRZIaZWhtsYdVTLnHFeot/IcqxZS83nwNK8syI QflTIWYGJs/lvhB0stinR6Z31PuqR0ZTh65fBk66SDgYVvujyJ5mxCm876PNCIeOC98a h0iw==
X-Gm-Message-State: ACrzQf2KxTSBBCUjXmJ0YToTr+F6UnH+1AqjoRH78Ojh61xLvn9GQcUv 9ZlInMSiB4CJZa2+ABoj1U8Z9sMkVAHIXyD1SoATag==
X-Google-Smtp-Source: AMsMyM73ZxcSemqNoTRtJslHufACf2c2lBrh2EO8M+R4J8gbOr6mkVed9ek0ycFgkJQvAAzQu4SzsTR4IDR+QlHVHnY=
X-Received: by 2002:a05:6870:524b:b0:12c:cfd2:81c0 with SMTP id o11-20020a056870524b00b0012ccfd281c0mr3468355oai.209.1663891413950; Thu, 22 Sep 2022 17:03:33 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAM5+tA9kttCKrZaoB7UzNdE6TU1qGNMaxDmWvFtRvpB4A8+WHA@mail.gmail.com> <8FE71499-D155-4853-A964-6617F6EA2069@gmail.com> <CAM5+tA9QuYxVs+NXBD3dAYr_Y=95bWt63WjmEMDOfegL0Z4otA@mail.gmail.com> <CAM5+tA_hg2sXXsYw6Tcx-ytRAMkKQcFw8a3N7SfEXwbuPm0LMw@mail.gmail.com> <00ea3b70-ba8e-b6ef-e1ce-fdd56828f506@gmail.com> <CAPt1N1=_9Rwj-HnUZKWfatARbHWptArmSAV-qdi8MKyoBf9R0A@mail.gmail.com> <CAO42Z2xZ_-mDh66A9DK+3ieEqGMqW0Pt+mZzVOmzz4cDRUTEXA@mail.gmail.com> <CAPt1N1nqwMvVHvEGAx0jxgWhbW9ZUQfAZSDn-qRYQ0CDy-EGKQ@mail.gmail.com> <17a28c173ed640e68b1cbf504bbeae49@huawei.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com> <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com> <CAO42Z2xf1jL_e4H6y=RgLKyxBCJfk2wL_fnLtBHSQ-ZiFymYUA@mail.gmail.com>
In-Reply-To: <CAO42Z2xf1jL_e4H6y=RgLKyxBCJfk2wL_fnLtBHSQ-ZiFymYUA@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 22 Sep 2022 20:03:23 -0400
Message-ID: <CAPt1N1mdrk515dHqcYR8itxVOLk45WQk4C3sRo2quaEJCUHqiQ@mail.gmail.com>
Subject: Re: RFC6724-bis?
To: Mark Smith <markzzzsmith@gmail.com>
Cc: 6man WG <ipv6@ietf.org>, David Farmer <farmer=40umn.edu@dmarc.ietf.org>, Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ac760005e94ce87b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/F7fGPegjyQx1_zyrvpKsISCLLEw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Sep 2022 00:03:46 -0000

Based on what data is this the uncommon case?

Op do 22 sep. 2022 om 19:59 schreef Mark Smith <markzzzsmith@gmail.com>

>
>
> On Fri, 23 Sept 2022, 02:51 David Farmer, <farmer=40umn.edu@dmarc.ietf.org>
> wrote:
>
>> Experience has shown us that despite recommendations to the contrary,
>> ULAs are in the Public DNS, how much is questionable, but it exists
>> nonetheless.
>>
>> Further, using the converse to the argument that address collisions are a
>> very low probability event, if ULA prefixes are randomly selected, as
>> recommended in RFC 4193; therefore, any such randomly selected ULA prefix
>> learned from the DNS is going to have a very high probability that it is
>> unreachable. This is why, we shouldn’t prefer ULA address unless there is
>> knowledge the ULA prefix is actually locally connected.
>>
>> It’s worth repeating, unless a ULA prefix is know to be locally
>> connected, there is a very high probability that any connections to it will
>> simply fail.
>>
>> Now I have some related questions, is this connection failure going to
>> result in a full TCP timeout or happy eyeballs timer expiring? Or, will an
>> ICMP destination unreachable or other ICMP message shortcut the TCP timeout
>> or the happy eyeballs timer? Will most CPEs on the market generate an ICMP
>> destination unreachable, an ICMP administratively disallowed, or simply
>> just forward the packet to the upstream ISP using the default route? Would
>> most ISPs generate an ICMP destination unreachable for the ULA in this
>> case? Finally, even if the ISP’s router generates the ICMP destination
>> unreachable, in most cases, I don’t believe the ISP will have a route back
>> to the originating ULA address anyway.
>>
>> So, I think we are probably better off with SA/DA selection not
>> preferring ULA unless the prefix is know to be local.  This is the best
>> guess.
>>
>
> You're optimising for the uncommon case.
> .
>
>>
>> Thanks.
>>
>> On Thu, Sep 22, 2022 at 11:05 Vasilenko Eduard <vasilenko.eduard=
>> 40huawei.com@dmarc.ietf.org> wrote:
>>
>>> I hope DNS advertising ULA is not foreign. Problem solved.
>>>
>>> If the organization is using many ULA prefixes – they should be
>>> distributed everywhere,
>>>
>>> Or DNS should announce different views for different company regions.
>>>
>>>
>>>
>>> You are looking for the solution for the configuration inconsistency:
>>> DNS has announced something but routing is not available.
>>>
>>> Ed/
>>>
>>> *From:* Ted Lemon [mailto:mellon@fugue.com]
>>> *Sent:* Thursday, September 22, 2022 6:54 PM
>>> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
>>> *Cc:* Mark Smith <markzzzsmith@gmail.com>; 6man WG <ipv6@ietf.org>
>>> *Subject:* Re: RFC6724-bis?
>>>
>>>
>>>
>>> If I have a GUA and no ULA, and I get a ULA, I'm going to guess that I
>>> should use the GUA because I have no choice. If I have a GUA and a ULA, and
>>> I see a foreign ULA, longest match will choose the ULA, not the GUA, but
>>> there is no guarantee that the ULA is reachable from the foreign ULA. So
>>> no, longest match isn't actually going to reliably guess right here.
>>> Practically speaking, in this case using the GUA is always better, because
>>> even if my ULA happens to be reachable from the device with the foreign
>>> ULA, the GUA will still also work.
>>>
>>>
>>>
>>> On Thu, Sep 22, 2022 at 11:50 AM Vasilenko Eduard <
>>> vasilenko.eduard@huawei.com> wrote:
>>>
>>> The longest match helps to choose what is local
>>>
>>> It is rule 8 in RFC 6724.
>>>
>>> Already works.
>>>
>>> Ed/
>>>
>>> *From:* ipv6 [mailto:ipv6-bounces@ietf.org] *On Behalf Of *Ted Lemon
>>> *Sent:* Thursday, September 22, 2022 6:35 PM
>>> *To:* Mark Smith <markzzzsmith@gmail.com>
>>> *Cc:* 6man WG <ipv6@ietf.org>
>>> *Subject:* Re: RFC6724-bis?
>>>
>>>
>>>
>>> Still, a local ULA can be presumed reachable, whereas a ULA that is not
>>> configured locally may or may not be reachable. Ideally we want to try the
>>> thing that will work first. And we’ve actually seen non-local ULAs fail in
>>> the wild. So while doing happy eyeballs is a great way to avoid failing
>>> when your best guess is wrong, making better guesses is still good.
>>>
>>>
>>>
>>> Op do 22 sep. 2022 om 11:30 schreef Mark Smith <markzzzsmith@gmail.com>
>>>
>>>
>>>
>>> On Thu, 22 Sept 2022, 20:38 Ted Lemon, <mellon@fugue.com> wrote:
>>>
>>> Wouldn’t increasing the ULA priority have the problem that we’d get
>>> longest match wins on alien ULAs though?  I think that was why the “add
>>> local ULAs to the table” rule was originally proposed.
>>>
>>>
>>>
>>> Why is do people think the static default DA/SA selection will always
>>> accurately choose the best outcome for a dynamic network?
>>>
>>>
>>>
>>> The set of answers from DA/SA selection are supposed to be tested until
>>> one of them succeeds.
>>>
>>>
>>>
>>> A ULA response in a DNS RR should be the best answer most of the time,
>>> however sometimes the alternative GUA will be better and be successful.
>>>
>>>
>>>
>>> That is, try the ULA destination, and if that fails, try the GUA DA,
>>> when both are provided in a DNS response.
>>>
>>>
>>>
>>> A static algorithm like default DA/SA selection is sometimes going to be
>>> wrong when being applied to a dynamic situation.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Mark.
>>>
>>>
>>>
>>>
>>>
>>> Local ULAs might also be discovered through mDNS, which is I pretty much
>>> ubiquitous on home networks.
>>>
>>>
>>>
>>> Op do 22 sep. 2022 om 01:25 schreef Brian E Carpenter <
>>> brian.e.carpenter@gmail.com>
>>>
>>> I agree with Bob that a stand-alone draft (Updates: 6724) is probably
>>> a simpler approach than re-opening the whole RFC to comments.
>>>
>>> Apart from that, the proto-draft says:
>>>
>>>     An implementation MUST automatically add additional site-specific
>>> rows
>>>     to the default table based on its configured addresses, such as for
>>>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056] addresses,
>>>     for instance (see Sections 10.6 and 10.7 for examples).
>>>
>>> That doesn't really compute, because 6to4 is pretty much ancient history.
>>> If we make a change of this kind, I think it should be specific to ULAs.
>>> And if we want to make the section 10.6 behaviour mandatory, I think we'd
>>> want the wording to be precise (with an explicit description of the
>>> algorithm the kernel should use).
>>>
>>> We should also, I think, state clearly that the expectation is that ULAs
>>> will normally be discovered via split-horizon DNS, or some other local
>>> discovery mechanism (e.g. the one in GRASP [RFC8990]).
>>>
>>> The other question is: would it be sufficient to do something much
>>> simpler,
>>> i.e., simply boost the ULA prefix in the default policy table and all
>>> examples:
>>>
>>>       fc00::/7              31    13
>>>
>>> Where's the harm in that? It will mean that ULAs are picked by the
>>> longest match rule when they are present. That won't happen unless
>>> there *are* ULAs, so it has precisely zero impact on sites that don't
>>> use them.
>>>
>>> It does no harm to add higher precedence for locally defined ULAs, but
>>> I am not convinced it's useful either, in the normal case.
>>>
>>> The proto-draft also says:
>>>
>>>     This behavior is required for proper functioning of ULA addressing,
>>>     thus preserving the preference of IPv6 over legacy IPv4 in dual
>>> stacked
>>>     environments as detailed in draft-v6ops-ula. Additionally, requiring
>>>     local site-specific addressing entry into all nodes preference list
>>>     further scopes the network communication to local and remote per the
>>>     respective addressing blocks and creates a more consistent
>>> operational
>>>     model and user experience.
>>>
>>> I agree with the statement, but it would sit more naturally in a
>>> stand-alone update than as a patch on RFC6724.
>>>
>>> Regards
>>>     Brian
>>>
>>> On 21-Sep-22 20:47, Nick Buraglio wrote:
>>> > I've gotten some feedback that the diff is hard to read because of the
>>> > formatting, so here is a link to the proposal. Please bear in mind
>>> > that this is *very* crude and was meant to simply track the idea.
>>> > https://github.com/buraglio/ietf-draft-buraglio-rfc6724-update
>>> >
>>> > ----
>>> > nb
>>> >
>>> > On Wed, Sep 21, 2022 at 10:29 AM Nick Buraglio <buraglio@es.net>
>>> wrote:
>>> >>
>>> >> Totally agree - this is just a starting point. I am happy to work on
>>> >> whatever the group feels is the right approach and what we feel will
>>> >> reach consensus.
>>> >>
>>> >> ----
>>> >> nb
>>> >>
>>> >> On Wed, Sep 21, 2022 at 10:25 AM Tim Chown <tjc.ietf@gmail.com>
>>> wrote:
>>> >>>
>>> >>> Thanks Nick.
>>> >>>
>>> >>> I think the aim here is to see if the WG can get consensus on an
>>> approach to address the problem, and document that for consideration for WG
>>> adoption.  Nick has diffs below to 6724, but it could be a short standalone
>>> document the updates 6724.
>>> >>>
>>> >>> Tim
>>> >>>
>>> >>>> On 21 Sep 2022, at 09:02, Nick Buraglio <buraglio@es.net> wrote:
>>> >>>>
>>> >>>> The changes that I had proposed in my github repo are below, these
>>> are
>>> >>>> just a starting point, I welcome any and all input.
>>> >>>>
>>> >>>>
>>> >>>>
>>> >>>> @@ -12,7 +12,7 @@ ISSN: 2070-1721
>>> >>>>        A. Matsumoto
>>> >>>>
>>> >>>>
>>> >>>>      Default Address Selection for Internet Protocol Version 6
>>> (IPv6)
>>> >>>> -
>>> >>>> +                ietf-draft-buraglio-rfc6724-update.txt
>>> >>>> Abstract
>>> >>>>
>>> >>>>     This document describes two algorithms, one for source address
>>> >>>> @@ -347,14 +347,14 @@ RFC 6724           Default Address Selection
>>> for
>>> >>>> IPv6     September 2012
>>> >>>>        fec0::/10              1    11
>>> >>>>        3ffe::/16              1    12
>>> >>>>        fec0::/10              1    11
>>> >>>>        3ffe::/16              1    12
>>> >>>>
>>> >>>> -   An implementation MAY automatically add additional
>>> site-specific rows
>>> >>>> +   An implementation MUST automatically add additional
>>> site-specific rows
>>> >>>>     to the default table based on its configured addresses, such as
>>> for
>>> >>>>     Unique Local Addresses (ULAs) [RFC4193] and 6to4 [RFC3056]
>>> addresses,
>>> >>>>     for instance (see Sections 10.6 and 10.7 for examples).  Any
>>> such
>>> >>>>     rows automatically added by the implementation as a result of
>>> address
>>> >>>>     acquisition MUST NOT override a row for the same prefix
>>> configured
>>> >>>>     via other means.  That is, rows can be added but never updated
>>> >>>> -   automatically.  An implementation SHOULD provide a means (the
>>> >>>> +   automatically.  An implementation MUST provide a means (the
>>> >>>>     Automatic Row Additions flag) for an administrator to disable
>>> >>>>     automatic row additions.
>>> >>>>
>>> >>>> @@ -363,7 +363,15 @@ RFC 6724           Default Address Selection
>>> for
>>> >>>> IPv6     September 2012
>>> >>>>     addresses, 6to4 source addresses with 6to4 destination
>>> addresses,
>>> >>>>     etc.  Another effect of the default policy table is to prefer
>>> >>>>     communication using IPv6 addresses to communication using IPv4
>>> >>>> -   addresses, if matching source addresses are available.
>>> >>>> +   addresses, if matching source addresses are available.
>>> >>>> +
>>> >>>> +   This behavior is required for proper functioning of ULA
>>> addressing,
>>> >>>> +   thus preserving the preference of IPv6 over legacy IPv4 in dual
>>> stacked
>>> >>>> +   environments as detailed in draft-v6ops-ula. Additionally,
>>> requiring
>>> >>>> +   local site-specific addressing entry into all nodes preference
>>> list
>>> >>>> +   further scopes the network communication to local and remote
>>> per the
>>> >>>> +   respective addressing blocks and creates a more consistent
>>> operational
>>> >>>> +   model and user experience.
>>> >>>>
>>> >>>>     Policy table entries for address prefixes that are not of global
>>> >>>>     scope MAY be qualified with an optional zone index.  If so, a
>>> prefix
>>> >>>> @@ -1541,7 +1549,7 @@ RFC 6724           Default Address Selection
>>> for
>>> >>>> IPv6     September 2012
>>> >>>>                     C., and M. Azinger, "IANA-Reserved IPv4 Prefix
>>> for
>>> >>>>                     Shared Address Space", BCP 153, RFC 6598, April
>>> 2012.
>>> >>>>
>>> >>>> -
>>> >>>> +
>>> >>>>
>>> >>>>
>>> >>>>
>>> >>>> @@ -1775,6 +1783,9 @@ Authors' Addresses
>>> >>>>
>>> >>>>
>>> >>>> ----
>>> >>>> nb
>>> >>>>
>>> >>>> On Tue, Sep 20, 2022 at 6:06 PM Tim Chown <tjc.ietf@gmail.com>
>>> wrote:
>>> >>>>>
>>> >>>>> Hi,
>>> >>>>>
>>> >>>>> As an author of RFC6724 I’ve had the discussions about a possible
>>> update of RFC6724 brought to my attention.
>>> >>>>>
>>> >>>>> An example thread over on v6ops is
>>> https://mailarchive.ietf.org/arch/msg/v6ops/W6HjHc11JX364soq3t3gFMHSawE/,
>>> but there are others.
>>> >>>>>
>>> >>>>> Nick Buraglio has documented the problem in
>>> draft-ietf-v6ops-ula-00.  The short of it is that RFC1918 IPv4 addresses
>>> may be preferred to IPv6 ULAs in certain circumstances, which I would agree
>>> is not desired behaviour.
>>> >>>>>
>>> >>>>> There are a few ways we might look to address this.  There is a
>>> proposal from Nick (not yet published outside a git repo) to address it by
>>> changing wording in section 2.1, with a couple of MAYs becoming MUSTs, and
>>> adding an extra explaining paragraph.  This basically firms up the
>>> requirement to follow 6.10 on adding an extra precedence line for local ULA
>>> prefix(es).
>>> >>>>>
>>> >>>>> Now, that may or may not be the preferred solution of the WG, but
>>> I think there’s a few questions to consider:
>>> >>>>>
>>> >>>>> 1. Is there agreement we should address the problem?  I’d assume
>>> so because Nick's problem draft was adopted by v6ops.
>>> >>>>>
>>> >>>>> 2. If so, is 6man the place to do it?  I think it has to be.
>>> RFC6724 was born here.
>>> >>>>>
>>> >>>>> 3. How do we determine the best solution to the problem?  I
>>> suspect there are nuances in play that will make a one size fit all
>>> ’simple’ fix tricky, but I look forward to the discussion.  Nick has one
>>> proposal that counts to a couple of word changes and an extra paragraph,
>>> which I’d encourage him to share here, but there are other approaches
>>> proposed on v6ops.  I think either way, it will require some update to or
>>> for RFC6724.
>>> >>>>>
>>> >>>>> 4. Does this work warrant a full -bis or would a separate RFC that
>>> updates 6724 be better?  A separate Updating draft might better highlight
>>> the issue to implementors.  But then RFC6724 is now ten years old, and
>>> RFC3484 which it replaced was nine years before that.
>>> >>>>>
>>> >>>>> 5. If we choose to open up a full -bis, are there any other worms
>>> in this can?  I have a feeling also here I know the likely answer….
>>> >>>>>
>>> >>>>> Anyway, over to the WG… thoughts?
>>> >>>>>
>>> >>>>> Tim
>>> >>>
>>> >
>>> > --------------------------------------------------------------------
>>> > IETF IPv6 working group mailing list
>>> > ipv6@ietf.org
>>> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> > --------------------------------------------------------------------
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>>
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>>
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>>
>> --
>> ===============================================
>> David Farmer               Email:farmer@umn.edu
>> Networking & Telecommunication Services
>> Office of Information Technology
>> University of Minnesota
>> 2218 University Ave SE
>> <https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g>
>>       Phone: 612-626-0815
>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
>> ===============================================
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>