[IPv6]Re: RFC 4291 and Site-Local Addressing
Bob Hinden <bob.hinden@gmail.com> Fri, 01 November 2024 21:25 UTC
Return-Path: <bob.hinden@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F71CC1CAF36 for <ipv6@ietfa.amsl.com>; Fri, 1 Nov 2024 14:25:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 27XNN2Lceze1 for <ipv6@ietfa.amsl.com>; Fri, 1 Nov 2024 14:25:08 -0700 (PDT)
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 39330C1D61F2 for <ipv6@ietf.org>; Fri, 1 Nov 2024 14:25:08 -0700 (PDT)
Received: by mail-wm1-x336.google.com with SMTP id 5b1f17b1804b1-4315eeb2601so25512205e9.2 for <ipv6@ietf.org>; Fri, 01 Nov 2024 14:25:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1730496307; x=1731101107; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=sQNd93Xv0LQ80DD/8lJzZA+Xq1ZtBZRUMIEVDb78kwk=; b=LVSadUYuxy9vdENphCmR5YdhsglFhCUzKveITvTButd3krtxhfNAiJ5l7wP4POsitE O0FTIz2U8lTFIq/GBd/3DH/sD/5VEvtJjVuA4Pgh0XJgyZcpRGzrlMqpD1IxTUL1ibg7 tcQ0VIOhx4xQCtD9ODZ/uBAOpParSz+Q8Tx1OkMeqOy8rb28Xgn8Dv5lDk3i+wARim1v /uSIgD12JGU2KC1M5/LX+CoCBgpM7nu2kmtwwCV7Nll7ZkwXJmtAnAK6/6LVInYl7Fgz YP5Hare8ZH5MOky51RofKOWncFKq5UL5t/Iv2xGB+YLwIVVA/zVDn4+HIHJ8o+Tm7KSe KSzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1730496307; x=1731101107; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=sQNd93Xv0LQ80DD/8lJzZA+Xq1ZtBZRUMIEVDb78kwk=; b=xMKY7YqryHnTlQHxkVMO/WXChQByuW6GziRyx7hP1Rid3vm7an9xqrTQmWQgOkdCDN t/wb0Ps2zKuTllTnmRn/tLKkJ9va5W+kejhidgMD6xYbO3RfwNHK2xHXmq9kvBpFPtxr S4GKmGWTOkPUYoEjrSyXGHs+YmclU7X3V28KYfSGDrbwteTM5dyqg4hV9drirsLoi2Z4 5eJHa4zMwEY1rMjqcqupXGqoW9eB0HKGp/rhl38Ug5F7Opxi0mlLMEYJIHrlkDQFvvDZ E3LaEpvi3KJmScr6DBXqqSV1v+nWPr+UVUD/6KRgd+Ocev84lhUi6j1u3/zwrym7qK+S zQEQ==
X-Forwarded-Encrypted: i=1; AJvYcCWw6yuilH6L8gnJFet5MsDTghUo9JgMrF18/igcTXlDymLhwbd3GMErdTKui54JL7Tyw4v/@ietf.org
X-Gm-Message-State: AOJu0YyCe8ZrU1Z/Hp9QOSpkEnpQlBRfn/Hw4MMI4Y64dcDkXpqkf4yJ TaBxohRBpbWRV4UKU/9kAqu3HMixR5SwGx0IhK5FEp9tt4Rlscx/
X-Google-Smtp-Source: AGHT+IHkOrNgoYr08leHNZiisyZzOQCP/AHDshiHnuzt4NmCuI5qmTeeHwKm1Y01wzxdYOLiAdwJng==
X-Received: by 2002:a05:6000:1aca:b0:37d:511b:aec1 with SMTP id ffacd0b85a97d-381c7ac4208mr4145709f8f.45.1730496306188; Fri, 01 Nov 2024 14:25:06 -0700 (PDT)
Received: from smtpclient.apple (dhcp-90e9.meeting.ietf.org. [31.133.144.233]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4327d5bf447sm72315605e9.13.2024.11.01.14.25.05 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 01 Nov 2024 14:25:05 -0700 (PDT)
From: Bob Hinden <bob.hinden@gmail.com>
Message-Id: <E62D9682-17AD-433E-BE6E-583CAB150965@gmail.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_98464F09-44EF-44AE-915E-F3A34C941E74"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3818.100.11.1.3\))
Date: Fri, 01 Nov 2024 21:24:44 +0000
In-Reply-To: <CAN-Dau24G4+9MFmeLZ3zM7PM8GGkAqLUFQKFLuuezwf3GDg3AQ@mail.gmail.com>
To: David Farmer <farmer@umn.edu>
References: <CH0PR18MB4274ACAC5E184305624AD01CAC542@CH0PR18MB4274.namprd18.prod.outlook.com> <CALPNdGtqR8uEUM16Ma7Ti2Fsx388f2b9NUwdrQ4+iSYr8zpfmA@mail.gmail.com> <CH0PR18MB4274D9962D00062EFC286F4DAC542@CH0PR18MB4274.namprd18.prod.outlook.com> <CALPNdGtMAxZH6BBNZdAvcieExz925XdnktZrd50LuUcVPbjtew@mail.gmail.com> <BL1PR18MB4277B9315A2FEFA816B0DDD8AC552@BL1PR18MB4277.namprd18.prod.outlook.com> <CALPNdGtrc4Lq-EWnUUVdcViewDRHL41TQV0C42Vm9X9QbszhCw@mail.gmail.com> <BL1PR18MB42773D8C4CD4D88C0C4788BBAC562@BL1PR18MB4277.namprd18.prod.outlook.com> <CALPNdGvN=90eutWW54P0CgX2CLfdeH69phMLffng_pV7_Qkueg@mail.gmail.com> <CAN-Dau31DQrWEDuV6yxQqcwQFc9NE845WALNbU80jKONsGmDxw@mail.gmail.com> <BL1PR18MB427750C210A82889281CDACEAC562@BL1PR18MB4277.namprd18.prod.outlook.com> <CAN-Dau2TAW+QNuUwrVDKiemFtk5Y5=9zyd_=_0GSxfzOU0Zg2A@mail.gmail.com> <BL1PR18MB4277A3B1A68A0182AEEDEF0BAC562@BL1PR18MB4277.namprd18.prod.outlook.com> <0F832998-FBA3-4227-9D1B-70EE3AB88506@gmail.com> <BL1PR18MB4277FD019EB9318AE216C1B4AC562@BL1PR18MB4277.namprd18.prod.outlook.com> <CAN-Dau24G4+9MFmeLZ3zM7PM8GGkAqLUFQKFLuuezwf3GDg3AQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3818.100.11.1.3)
Message-ID-Hash: ZK2SE7Z2TMO7YH3VXPH5TY57DQ6FN7MU
X-Message-ID-Hash: ZK2SE7Z2TMO7YH3VXPH5TY57DQ6FN7MU
X-MailFrom: bob.hinden@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bob Hinden <bob.hinden@gmail.com>, IPv6 List <ipv6@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: RFC 4291 and Site-Local Addressing
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/nbY6Di2cKztmvIWFd8bMVnkfj5k>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>
David, > On Nov 1, 2024, at 9:07 PM, David Farmer <farmer@umn.edu> wrote: > > I like that approach. > > Write an RFC3789-bis in the introduction, point out that ULA replaces Site-Local, then; > Move to Site Local and the prefixes fec0:/10 to "MUST NOT use." > Update RFC4291, removing section 2.5.7. > Update RFC6724, removing the fec0::/10 label from the policy table. > Thanks. +1 Bob > > > > On Fri, Nov 1, 2024 at 15:55 Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> wrote: >> Bob- >> >> >> >> Thanks, I would agree with that. But could that 3879 bis also be categorized as an update to 4291? That way any implementation/compliance linkage to 4291 would have that traceability. >> >> >> >> >> >> -Jeremy >> >> >> >> >> >> From: Bob Hinden <bob.hinden@gmail.com <mailto:bob.hinden@gmail.com>> >> Sent: Friday, November 1, 2024 4:21 PM >> To: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> >> Cc: Bob Hinden <bob.hinden@gmail.com <mailto:bob.hinden@gmail.com>>; David Farmer <farmer@umn.edu <mailto:farmer@umn.edu>>; IPv6 List <ipv6@ietf.org <mailto:ipv6@ietf.org>> >> Subject: Re: [IPv6]Re: RFC 4291 and Site-Local Addressing >> >> >> >> Jeremy, >> >> >> >> >> On Nov 1, 2024, at 7:51 PM, Jeremy Duncan <jduncan=40tachyondynamics.com@dmarc.ietf.org <mailto:jduncan=40tachyondynamics.com@dmarc.ietf.org>> wrote: >> >> >> >> David- >> >> >> >> Highlighting again how 3879 was published in *2004* – if there are “existing implementations” using site-local addressing I guess that means we should start accommodating unsupported 20-year old OS/network stacks in all of our IPv6 standards discussions? >> >> >> >> Does that sentence even apply now? >> >> >> >> And I don’t agree that there’s a balance to be struck here. Because this is what stack implementations are doing as we speak not familiar with all of this crazy nuance: building in support to configure, pass, and implement site-local addressing because it is still part of RFC 4291. So they do this because they want to claim compliance with 4291. Then they go for a USGv6 (or other type IPv6) certification and have to meet site-local addressing requirements. >> >> >> >> We are all saying and doing both things at once. Let’s just do a bis on 4291 and fix this mess. >> >> >> >> Instead of resurrecting RFC4291bis, another approach would be to do a bis of RFC3879. I assume the biggest change would be to make the deprecation stronger. For example change: >> >> >> >> Existing implementations and deployments MAY continue to use this >> >> prefix. >> >> >> >> s/MAY continue/MUST NOT continue/ >> >> >> >> Bob >> >> >> >> >> >> >> >> >> >> >> >> >> >> -Jeremy >> >> >> >> From: David Farmer <farmer@umn.edu <mailto:farmer@umn.edu>> >> Sent: Friday, November 1, 2024 3:38 PM >> To: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> >> Cc: Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>>; ipv6@ietf.org <mailto:ipv6@ietf.org> >> Subject: Re: [IPv6]Re: RFC 4291 and Site-Local Addressing >> >> >> >> [EXTERNAL] Verify links and attachments with sender. >> >> It is not quite that simple; >> >> >> >> In RFC3484, Site Local has a preference because of its scope; RFC6724 removed that, but per Appendix B #3; >> >> >> >> Added a row for site-local addresses (fec0::/10) in order to depreference them, for consistency with the example in Section 10.3, since they are deprecated [RFC3879]. >> >> >> >> I think that is correct. The scope preference was removed, and adding the entry allowed it to be dereferenced, which is consistent with "deprecated." >> >> >> >> Also, immediately following the paragraph you Quoted, it says; >> >> >> >> Existing implementations and deployments MAY continue to use this prefix. >> >> >> >> Given that they can continue to exist, I think RFC6724 has the correct balance. >> >> >> >> In other words, Site Local has been deprecated, as in "SHOULD NOT be used. " It has not been made Historical, AKA killed, shot dead, or exterminated. Maybe we should send the Daleks after Site Local addresses, "EXTERMINATE!, EXTERMINATE!" But we haven't done that yet. >> >> >> >> Thanks >> >> >> >> On Fri, Nov 1, 2024 at 2:09 PM Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> wrote: >> >> So, should we not follow the very explicit recommendation in the Deprecation section - sec 4 of 3879? >> >> >> >> “The references to site local addresses should be removed as soon as >> >> practical from the revision of the Default Address Selection for >> >> Internet Protocol version 6 [RFC3484 <https://datatracker.ietf.org/doc/html/rfc3484>], the revision of the Basic >> >> Socket Interface Extensions for IPv6 [RFC3493 <https://datatracker.ietf.org/doc/html/rfc3493>], and from the revision >> >> of the Internet Protocol Version 6 (IPv6) Addressing Architecture >> >> [RFC3513 <https://datatracker.ietf.org/doc/html/rfc3513>]. Incidental references to site local addresses should be >> >> removed from other IETF documents if and when they are updated. >> >> These documents include [RFC2772, RFC2894 <https://datatracker.ietf.org/doc/html/rfc2894>, RFC3082 <https://datatracker.ietf.org/doc/html/rfc3082>, RFC3111 <https://datatracker.ietf.org/doc/html/rfc3111>, RFC3142 <https://datatracker.ietf.org/doc/html/rfc3142>, >> >> RFC3177 <https://datatracker.ietf.org/doc/html/rfc3177>, and RFC3316 <https://datatracker.ietf.org/doc/html/rfc3316>].” >> >> >> >> Is 20 years not “as soon practical?” – that is specifically calling out 6724 and 4291 (even though those are even older RFCs) >> >> It’s getting a little hard to talk about the cutting edge of IPv6 when we have all these “hanging chads” in the standards. >> >> >> >> Between, site-local, mobile IPv6, and SeND we have a bunch of things that have no implementation but plenty of standards. >> >> >> >> There’s no wonder implementations get confused. >> >> >> >> >> >> -Jeremy >> >> >> >> From: David Farmer <farmer@umn.edu <mailto:farmer@umn.edu>> >> Sent: Friday, November 1, 2024 2:38 PM >> To: Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>> >> Cc: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>>; ipv6@ietf.org <mailto:ipv6@ietf.org> >> Subject: Re: [IPv6]Re: RFC 4291 and Site-Local Addressing >> >> >> >> [EXTERNAL] Verify links and attachments with sender. >> >> I guess my question is: What is the intent of any change? >> >> >> >> Here are my thoughts; >> >> >> >> 1. I don't think fec0::/10 should ever be returned to the available IPv6 pool. >> >> 2. It is currently listed in the IPv6 Address Space Registry but not the IPv6 Special Purpose Address Registry. Maybe it should be added to the latter with a reference to the termination date list as the date of RFC3879. >> >> https://www.iana.org/assignments/ipv6-address-space/ipv6-address-space.xhtml >> >> https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml >> >> 3. It is in the RFC6724 Default Policy Table with the lowest possible priority, which ensures any other address will be preferred, which I believe is our intention. If removed, they would be treated as GUA, which I don't believe is our intention. >> >> 4. They could be removed from an updated RFC4291 and likely ULA added in their place. However, I don't see this issue driving an update to RFC4291. As mentioned, there has been a lack of consensus on updating RFC4291. >> >> >> >> Thanks. >> >> >> >> On Fri, Nov 1, 2024 at 12:19 PM Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>> wrote: >> >> Hi Jeremy, >> >> >> >> I don't know. I think a small section saying "this was once a thing, don't do it anymore" isn't harmful and doesn't necessarily need to be removed but that's just my opinion. >> >> >> >> Why would it be a failed test if another GUA was configured on the interface? If the destination address is fec0::/10 and the node has two source addresses, one fec0::/10 and some other GUA, the fec0::/10 address should be used as the source because of rule 6. >> >> >> >> Thanks, >> Kyle >> >> >> >> On Fri, Nov 1, 2024 at 10:47 AM Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> wrote: >> >> Kyle- >> >> >> >> 4291 has been in place as is and 3879 has deprecated site local addressing for 20 years. How much longer should it be in this state? >> >> >> >> Also, the policy table would cause a failed test case if there happened to be another Global Unicast Address on the interface. Because it will use the GUI instead of the site local based on the prefix policy table. >> >> >> >> >> >> -Jeremy >> >> >> >> From: Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>> >> Sent: Thursday, October 31, 2024 4:45 PM >> To: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> >> Cc: ipv6@ietf.org <mailto:ipv6@ietf.org> >> Subject: Re: [IPv6]RFC 4291 and Site-Local Addressing >> >> >> >> [EXTERNAL] Verify links and attachments with sender. >> >> Hi Jeremy, >> >> >> >> Yes, I see your point about the policy table. Is there harm in leaving 4291 2.5.7 more for historical purposes? New implementations shouldn't apply special behavior to the fec0::/10 prefix, but should 4291 continue to be verbose about this? >> >> >> >> As for the AA 1.5 tests, they're not fully redundant. They provide checks to ensure implementations don't interpret RFC 3879 as a "drop". >> >> >> >> Thanks, >> Kyle >> >> >> >> On Thu, Oct 31, 2024 at 1:50 PM Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> wrote: >> >> Kyle- >> >> >> >> Not a problem per se. Just that if someone were to implement site local addressing in their network, the prefix policy tables would not treat it as global unicast addressing. It would treat it in precedence below IPv4, ULA, etc. >> >> >> >> So I’m asking if the 6man would like to take up a full deprecation of site local addressing to remove it from 4291 and potentially 6724. >> >> >> >> In relation to the AA 1.5 tests, if the intent is to test it as GUI, then it’s a redundant test right? >> >> >> >> >> >> -Jeremy >> >> >> >> From: Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>> >> Sent: Thursday, October 31, 2024 1:42 PM >> To: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> >> Cc: ipv6@ietf.org <mailto:ipv6@ietf.org> >> Subject: Re: [IPv6]RFC 4291 and Site-Local Addressing >> >> >> >> [EXTERNAL] Verify links and attachments with sender. >> >> Hi Jeremy, >> >> >> >> I'm not sure I understand the problem you're describing and how it relates to the AA 1.5 tests. Can you provide more details on the problem you're facing? >> >> >> >> Thanks, >> Kyle >> >> >> >> On Wed, Oct 30, 2024 at 5:05 PM Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> wrote: >> >> Kyle, thanks but Address Architecture test case 1.5 merely tests that site local is being used. So an echo request and reply using it as the source. The problem is that RFC 6724 has moved it down to precedence 1 with label 11. So in essence a node conforming to 6724 would label it as a site local and not a standard global unicast right? >> >> >> >> >> >> >> >> Semper Fi, >> >> Jeremy Duncan >> >> Sent from my cell >> >> From: Kyle Ouellette <kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu>> >> Sent: Wednesday, October 30, 2024 4:49:09 PM >> To: Jeremy Duncan <jduncan@tachyondynamics.com <mailto:jduncan@tachyondynamics.com>> >> Cc: ipv6@ietf.org <mailto:ipv6@ietf.org> <ipv6@ietf.org <mailto:ipv6@ietf.org>> >> Subject: Re: [IPv6]RFC 4291 and Site-Local Addressing >> >> >> >> [EXTERNAL] Verify links and attachments with sender. >> >> Hi Jeremy, >> >> >> >> The IPv6 Ready Core tests you're referring to test that Site Local addresses are deprecated and not supported. Specifically this statement from 2.5.7: "The special behavior of this prefix defined in [RFC3513] must no longer be supported in new implementations (i.e., new implementations must treat this prefix as Global Unicast)." >> >> >> >> Thanks, >> Kyle >> >> >> >> On Wed, Oct 30, 2024 at 4:27 PM Jeremy Duncan <jduncan=40tachyondynamics.com@dmarc.ietf.org <mailto:40tachyondynamics.com@dmarc.ietf.org>> wrote: >> >> Hello 6Man- >> >> >> >> Is there any reason that Site local addressing fec0::/10 is still included in RFC 4291? Since the deprecation was done back in RFC 3879 in 2004, it still remains in 4291. Which also means all of the IPv6 Ready conformance and interoperability testing still requires these test cases. >> >> >> >> Is there any appetite to get a bis/update in place to do a removal of section 2.5.7 in RFC 4291? >> >> >> >> >> >> -Jeremy >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org <mailto:ipv6@ietf.org> >> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ >> -------------------------------------------------------------------- >> >> >> >> >> >> -- >> >> Kyle Ouellette >> >> Software Development Manager, IP Technologies >> >> UNH InterOperability Laboratory >> >> 21 Madbury Rd, Suite 100, Durham, NH 03824 <https://www.google.com/maps/search/21+Madbury+Rd,+Suite+100,+Durham,+NH+03824?entry=gmail&source=g> >> kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu> >> www.iol.unh.edu >> <http://www.iol.unh.edu/> >> >> >> >> >> >> >> >> >> >> -- >> >> Kyle Ouellette >> >> Software Development Manager, IP Technologies >> >> UNH InterOperability Laboratory >> >> 21 Madbury Rd, Suite 100, Durham, NH 03824 <https://www.google.com/maps/search/21+Madbury+Rd,+Suite+100,+Durham,+NH+03824?entry=gmail&source=g> >> kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu> >> www.iol.unh.edu >> <http://www.iol.unh.edu/> >> >> >> >> >> >> >> >> >> >> -- >> >> Kyle Ouellette >> >> Software Development Manager, IP Technologies >> >> UNH InterOperability Laboratory >> >> 21 Madbury Rd, Suite 100, Durham, NH 03824 <https://www.google.com/maps/search/21+Madbury+Rd,+Suite+100,+Durham,+NH+03824?entry=gmail&source=g> >> kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu> >> www.iol.unh.edu >> <http://www.iol.unh.edu/> >> >> >> >> >> >> >> >> >> >> -- >> >> Kyle Ouellette >> >> Software Development Manager, IP Technologies >> >> UNH InterOperability Laboratory >> >> 21 Madbury Rd, Suite 100, Durham, NH 03824 <https://www.google.com/maps/search/21+Madbury+Rd,+Suite+100,+Durham,+NH+03824?entry=gmail&source=g> >> kouellette@iol.unh.edu <mailto:kouellette@iol.unh.edu> >> www.iol.unh.edu >> <http://www.iol.unh.edu/> >> >> >> >> >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org <mailto:ipv6@ietf.org> >> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ >> -------------------------------------------------------------------- >> >> >> >> >> >> -- >> >> =============================================== >> David Farmer Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu> >> Networking & Telecommunication Services >> Office of Information Technology >> University of Minnesota >> 2218 University Ave SE <https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g> Phone: 612-626-0815 >> Minneapolis, MN 55414-3029 Cell: 612-812-9952 >> =============================================== >> >> >> >> >> >> -- >> >> =============================================== >> David Farmer Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu> >> Networking & Telecommunication Services >> Office of Information Technology >> University of Minnesota >> 2218 University Ave SE <https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g> Phone: 612-626-0815 >> Minneapolis, MN 55414-3029 Cell: 612-812-9952 >> =============================================== >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org <mailto:ipv6@ietf.org> >> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ >> -------------------------------------------------------------------- >> >> >>
- [IPv6]RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Kyle Ouellette
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Brian E Carpenter
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Brian E Carpenter
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Kyle Ouellette
- [IPv6]Re: RFC 4291 and Site-Local Addressing Kyle Ouellette
- [IPv6]Re: RFC 4291 and Site-Local Addressing Brian E Carpenter
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing Kyle Ouellette
- [IPv6]Re: RFC 4291 and Site-Local Addressing David Farmer
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing David Farmer
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing David Farmer
- [IPv6]Re: RFC 4291 and Site-Local Addressing Bob Hinden
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan
- [IPv6]Re: RFC 4291 and Site-Local Addressing David Farmer
- [IPv6]Re: RFC 4291 and Site-Local Addressing Bob Hinden
- [IPv6]Re: RFC 4291 and Site-Local Addressing David Farmer
- [IPv6]Re: RFC 4291 and Site-Local Addressing Brian E Carpenter
- [IPv6]Re: RFC 4291 and Site-Local Addressing Tim Chown
- [IPv6]Re: RFC 4291 and Site-Local Addressing Brian E Carpenter
- [IPv6]Re: RFC 4291 and Site-Local Addressing Tim Chown
- [IPv6]Re: RFC 4291 and Site-Local Addressing Bob Hinden
- [IPv6]Re: RFC 4291 and Site-Local Addressing Jeremy Duncan