RE: Address privacy

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Mon, 27 January 2020 07:45 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95F1612001E for <ipv6@ietfa.amsl.com>; Sun, 26 Jan 2020 23:45:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=CFuojLS7; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=xgkIs6f/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A4onjiBwnkje for <ipv6@ietfa.amsl.com>; Sun, 26 Jan 2020 23:44:58 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4BD812012A for <ipv6@ietf.org>; Sun, 26 Jan 2020 23:44:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12768; q=dns/txt; s=iport; t=1580111097; x=1581320697; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=9Mk6vwd3mpUYTo5ar6sbLsmbDQtD505OIrEsZAJv6Ys=; b=CFuojLS73rqBjB0YgXkho8DL5E0kSExiEMXryFEwEC8KssGZQvJA4s6E vNtXDeDs541U4y7Zms5B9lhjbSKwEAss5JFaj4YntT2Baqj1qJT9GUj84 oxKEUudfgiBd9dA0OyTA4g58xsq7jrxIlCwynqHNJYxDkzWd682vx4Lu+ c=;
IronPort-PHdr: 9a23:Q848ZhM86uay2hDUrUUl6mtXPHoupqn0MwgJ65Eul7NJdOG58o//OFDEu6w/l0fHCIPc7f8My/HbtaztQyQh2d6AqzhDFf4ETBoZkYMTlg0kDtSCDBjjMP73ZSEgAOxJVURu+DewNk0GUMs=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AOAACPlC5e/5FdJa1mGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYFoBAEBAQELAYFTKScFbFggBAsqhBSDRgOLFIJfiWGOLoEugSQDVAkBAQEMAQEYCwoCAQGBTIJ0AheCCyQ1CA4CAw0BAQQBAQECAQUEbYU3DIVeAQEBAQMBARAREQwBASwCCQELBAIBCBEBAwEBAQICJgICAh8GCxUCBggCBAENBQgTB4JiASKCSgMuAQIMnnoCgTmIYXWBMoJ/AQEFhQ8NC4IMAwaBDioBhR2EN4EGgSYdGoFBP4ERR4JMPoIbSQEBgU0YFYJ5MoIsjWCCdZ5DRAqCOZIOhESCSIxPi2WOYIsIkAUCBAIEBQIOAQEFgVQBNjeBIXAVO4JsUBgNk2yBJwEJgkKFFIU/dAKBJ4oULIIXAQE
X-IronPort-AV: E=Sophos;i="5.70,369,1574121600"; d="scan'208";a="422148784"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 27 Jan 2020 07:44:56 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 00R7iuip014560 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 27 Jan 2020 07:44:56 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 27 Jan 2020 01:44:55 -0600
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 27 Jan 2020 02:44:54 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 27 Jan 2020 01:44:54 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XFItoW7WHm3uaXKppTZ5r4gFj8HbTEKwbawvkdzkmidWaiEkqORbJi88cCSDm67WV/dk87ASIgazfUfYDhIGYAinMh242/VkPGOqR3LfS2aVlABmU7t6E81NZTjOKGVeRgij98FXgPP2NvTtrfyFzPdRejnE+68968NQkiylXCFAQbxlKDba/5rGIkdq4lhPsZfc0eSTO+32pmepiTMOVkGNck/9wD00f7kNWPz/2eRZj7KOSraAAS+I1DqdUEw0f+TZid2TMQ6XF8A5SO88DYkTn41IbFr7hBk/+zPHCQfyci7uhMwqnohe0ir6taLzAYdvrDv3aitatukOUuIUvA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9Mk6vwd3mpUYTo5ar6sbLsmbDQtD505OIrEsZAJv6Ys=; b=chHnF4jP7oZi5Zbuvt9+guVXOTml06mhLW+rjlcpxBmy1Dl7mh8R7yNxlUwV4gf2TE6A8KEcc8tqDeT0r2vdJu1tsliztg62gQEA74fq5eJBPNtpB43f7nb52Vuv4bQrjhkfXk0UvFVXsendfBIB+JChWXBcqBBpVe3Q58eCF7DLsIDbtC8EGl7TNldHkdu/6oNBEc1Ft/KSxjvxqShVU2L/jMIJJ9Xd1IqinWLlmoVdPCk5csb0b2mHjeKwu2ypbrMoWjGz4nTd0ngqGIRiNLAIUmLa2J5I7eUbWTHn3Hj04vz7XIgNQtfcdStk047YkJejal06/ptsYFwQ7omvEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9Mk6vwd3mpUYTo5ar6sbLsmbDQtD505OIrEsZAJv6Ys=; b=xgkIs6f/+SJy6JC+tPv+NNq3jlhKpa2oSEYrES1esi+E97yoRjO10AkK6KsTC5poe7u1ahtkJOwzklzoJs5pHIQp2oQyVgyCQHbHSPPbxMB34/tEIsNhxYbX+WMyDXl1EuC+hE/6pUWR9KDzgFXqxRwjZCRpoCDqHsa3nnVfy1Q=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB4302.namprd11.prod.outlook.com (52.135.36.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.23; Mon, 27 Jan 2020 07:44:53 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a%3]) with mapi id 15.20.2665.017; Mon, 27 Jan 2020 07:44:53 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Tom Herbert <tom@herbertland.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>
CC: 6man <ipv6@ietf.org>
Subject: RE: Address privacy
Thread-Topic: Address privacy
Thread-Index: AQHV1INLUhhJ/JZsDEi8Uf6a00CeEqf9YdcAgAABNYCAAAlGAIAAC6WAgACoZvA=
Date: Mon, 27 Jan 2020 07:43:46 +0000
Deferred-Delivery: Mon, 27 Jan 2020 07:42:43 +0000
Message-ID: <MN2PR11MB35650E5E30B8A9B6F685880ED80B0@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <CALx6S36802oDaEgojAPq2c6hM_s1BayidXPh1Sc6RZmZa9UHpQ@mail.gmail.com> <89CDA9FE-6C41-4A5E-B6CD-ECC367DFDABA@employees.org> <1220b074-c7f5-bbc8-2991-a9af66caf8b7@gmail.com> <CALx6S35oHgGDxa6014HB8UCYct0V9hcPFWqhiRM2kCgaPMtyqQ@mail.gmail.com>
In-Reply-To: <CALx6S35oHgGDxa6014HB8UCYct0V9hcPFWqhiRM2kCgaPMtyqQ@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:44f3:1300:41e7:7725:e525:b2e8]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 407c376f-fc71-49b0-0ba5-08d7a2fccc09
x-ms-traffictypediagnostic: MN2PR11MB4302:
x-microsoft-antispam-prvs: <MN2PR11MB4302F39FA16A4439E2CA1A8ED80B0@MN2PR11MB4302.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 02951C14DC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(346002)(396003)(376002)(136003)(39860400002)(199004)(189003)(52536014)(8936002)(55016002)(5660300002)(9686003)(66476007)(66556008)(76116006)(64756008)(66446008)(53546011)(8676002)(81156014)(81166006)(66946007)(6506007)(71200400001)(186003)(86362001)(33656002)(3480700007)(6666004)(4326008)(316002)(110136005)(966005)(2906002)(7116003)(7696005)(478600001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4302; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: X7XxZ+IcHXkPF+6MrLdb3e2vvZhTFu9uDwju3W+Ngn+a/yK87019pSvNVsDvMhKuZkCFyhZCBIEDGzOduo6HJGhymjSQ+WN+DDBOl0t1PF5rD9ttJkVhSE1gx5toKsqbHTitLrLfGB4pucQGQaXphNUa2/XH9+OshAZHWP5EF3r6TtjRldmpr+LHkU6EIcf//bU1+R6qkm8wJJb9BpZrfUOF6v4ZPMec7xg98KMXT1ZV+W8RUhLHLAr19go8N5LdNagBTub1jMKfQgygJh4gSICQpDFUZ2/UnS5ezWztC5zS9u82MPvhPmlXYl7rs0N0vKwsM8qC7GIraZPt6XeS3rmptqWGKl85gyy9h0JUnIEssC5H0hnKdoGoN3bH0dAjMET//dpltl7WmXMoTgEPKipVdEfRiDnO1wAYt9AErU/qNkG15t0p4IWCeQVz8gI/Alqfl8MdPWrffRWSZMNUJ7fqU+aJewxIVsWRHOcEJHKlCCSuS+BoxbMn2eAhDTyMr5NLzEndRv3qziJNHSjmUw==
x-ms-exchange-antispam-messagedata: FE9ffRFVB1gl+vXSB/2jJJ1nbJXcD9KOVTFPTKlDk9Q6Q08oZrQqvWtRVz/YnFC6/PzrVxtJIooMwIY1NHkBJ7bO16mkOKbNBNQLUhzrYi67qPLlTYQQdLfuPH/evhsHrECaGguGg7WSg41e2912ek9EmbTtAD0bS6bUAk4ZXbOdU0dPKAxlIjO817TRPeSxC/xye9lHhXr3nUHhLslkUQ==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 407c376f-fc71-49b0-0ba5-08d7a2fccc09
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jan 2020 07:44:53.2828 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jS/aaJVYYvKCi/IkvDtfSWNNhQ7yGgYXduhgCMOr5x6rIkt7dBRMxrupqbnj0+sWBHkL9hlJUV5uDPTxipIDlw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4302
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/oC3XXSBkxCala33eFkfrcIacLBc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 07:45:01 -0000

Hello Tom

This looks similar to the idea of using Mobile IPv6 inside a domain: Hosts in the domain get only ULAs buy default. 
Hosts that need reach back from outside the domain obtain GUAs from common Home Agent that serves the domain.
That GUA becomes their home address. The ULA is the CareOf.
The MIP tunnel happens within the domain unbeknownst of the outside

This way:
- you get a better aggregation factor for privacy, mixed amongst the other devices in the domain.
- the network structure is hidden from the outside observer. It effectively appears as a flat /64.

Cheers,

Pascal

> -----Original Message-----
> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Tom Herbert
> Sent: dimanche 26 janvier 2020 22:35
> To: Brian E Carpenter <brian.e.carpenter@gmail.com>
> Cc: 6man <ipv6@ietf.org>
> Subject: Re: Address privacy
> 
> On Sun, Jan 26, 2020 at 12:53 PM Brian E Carpenter
> <brian.e.carpenter@gmail.com> wrote:
> >
> > On 27-Jan-20 09:20, Ole Troan wrote:
> > > The obvious answer is to put the source address in the encrypted payload. It
> does not have to be in the core header.
> > > There’s a paper on it somewhere, although I am not sure if that’s where the
> idea originated.
> >
> > Google "SNA: Sourceless Network Architecture" and "IPv6 source addresses
> considered harmful"
> >
> 
> There's also the possibility of putting location information into a modifiable HBH
> option (part of draft-herbert-fast-04). Something like:
> 
> - End host sends packet with HBH option for location
> - First hop in network writes its location into the HBH option. The location
> information identifies the hop (e.g. base station in a mobile
> network) and is only interpretable in the local network (encrypted for instance).
> - Packet is routed to destination with HBH option in tact.
> - At the destination, the HBH option is reflected on return packets for a flow.
> End host doesn't do anything else than just reflect.
> - At the ingress node to the network, the location information is decoded. Given
> this, the ingress forwards the packet to the locator node by address translation
> of encapsulation.
> - At the locator node, i.e. first network hop upstream of destination node, the
> encapsulation or translation is undone and packet is forwarded to the final
> destination.
> 
> I think this method was first proposed to ensure consistent routing to the same
> backend in L4 load balancing. Obvious downsides are the we need EH to work in
> the network and there are changes needed in the hosts.
> 
> Tom
> 
> >    Brian
> >
> > >
> > > Cheers
> > > Ole
> > >
> > >> On 26 Jan 2020, at 21:16, Tom Herbert <tom@herbertland.com> wrote:
> > >>
> > >> On Sun, Jan 26, 2020 at 11:59 AM Joel M. Halpern
> <jmh@joelhalpern.com> wrote:
> > >>>
> > >>> Tom, your description is somewhat misleading.
> > >>>
> > >>> On the one hand, LISP replies on per-flow state only in the
> > >>> mapping entity.  Not at arbitrary places in the network.
> > >>>
> > >>> Secondly, if hosts work in terms of identifiers, and the network
> > >>> works in temrs of locators, someone has to map them.  You can
> > >>> cache (including caching the whole thing), you can ask the host to hold
> the cache itself.
> > >>>  There are other tradeoffs you can make, moving things around.
> > >>> But you can't just magically make the problem disappear.
> > >>
> > >> Joel,
> > >>
> > >> It comes down to how many addresses need to be mapped. It's
> > >> intuitive that a higher frequency of address rotation yields more
> > >> privacy. But higher frequency of address rotation means more active
> > >> addresses in the network. This degenerates to the greatest
> > >> frequency of change which would be to give each flow it's own
> > >> unique address, and this is also the one case of temporary
> > >> addresses where we can quantify the privacy characteristics.
> > >>
> > >> However, giving each flow its own address quickly becomes a scaling
> > >> and management problem-- we're talking several billions of active
> > >> addresses in some provider networks. Hence, I believe we need
> > >> mapping functions that are more N:1 than 1:1 (the latter doesn't scale).
> > >> Similar, the ability of the network to delegate and map bundles of
> > >> uncorrelated addresses to devices would be useful.
> > >>
> > >> Tom
> > >>
> > >>>
> > >>> Yours,
> > >>> Joel
> > >>>
> > >>>> On 1/26/2020 2:51 PM, Tom Herbert wrote:
> > >>>> On Sun, Jan 26, 2020 at 9:42 AM Michael Richardson
> > >>>> <mcr+ietf@sandelman.ca> wrote:
> > >>>>>
> > >>>>>
> > >>>>> Tom Herbert <tom@herbertland.com> wrote:
> > >>>>>>> Except that instead of doing it at layer 4, you do it with
> > >>>>>>> IPsec, and extrude that /128 to your machine.  This is already
> > >>>>>>> a thing :-)
> > >>>>>>>
> > >>>>>>>> Another solution I’ve considered is to have a giant anonymity
> > >>>>>>>> mesh, with every ISP’s user participating, and forward flows
> through this
> > >>>>>>>> mesh, treating each customer as an anonymity server.   I think this
> is
> > >>>>>>>
> > >>>>>>> This is also a thing called Tor.
> > >>>>>>>
> > >>>>>> Michael,
> > >>>>>
> > >>>>>> Doesn't that require that the users must explicitly configure
> > >>>>>> when they want privacy? I think a general solution should be
> > >>>>>> transparent to
> > >>>>>
> > >>>>> Yes, I agree, it requires explicit configuration.
> > >>>>> I agree that this is not a good thing.
> > >>>>>
> > >>>>>> the user and "just works" to ensure their privacy. That in fact
> > >>>>>> is one of the arguments for NAT. If there is a significantly
> > >>>>>> large enough pool of users behind a NAT device, then the
> > >>>>>> obfuscation is transparent to the use and seems to be pretty
> > >>>>>> good privacy (good enough that law enforcement is concerned
> > >>>>>> about NAT). I suppose a similar effect could be achieved with a
> transparent proxy.
> > >>>>>
> > >>>>> Yes, and I think that more and more LEA will grow ever concerned
> > >>>>> about this situation, and it *is* pushing IPv6 adoption.  So, how can we
> find a happy medium?
> > >>>>>
> > >>>>>> You might want to take a look at draft-herbert-ipv6-prefix-address-
> privacy-00.
> > >>>>>
> > >>>>> An interesting read. I'm not sure where it goes.
> > >>>>>
> > >>>>> I would like Locator/Identifier separation.
> > >>>>> I wanted SHIM6. LISP would work, I think.
> > >>>>> Then privacy needs don't need to screw up efficient routing at the
> edge.
> > >>>>>
> > >>>> Hi Michael,
> > >>>>
> > >>>> The problem of LISP is that it potentially includes a cache in
> > >>>> the operator network that can be driven by downstream untrusted
> > >>>> users-- hence there is possibility of DOS attack on the cache
> > >>>> (this is the primary reason why LISP hasn't been accepted into Linux).
> > >>>>
> > >>>> What we really want is Identifier/Locator routing that neither
> > >>>> requires per flow state to be maintained in the network nor
> > >>>> relies on caches to get reasonable performance.
> > >>>> draft-herbert-ipv6-prefix-address-privacy suggests crypto
> > >>>> functions to map identifiers to locators at the edge.
> > >>>>
> > >>>> Tom
> > >>>>
> > >>>>
> > >>>>>
> > >>>>> --
> > >>>>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software
> > >>>>> Works  -= IPv6 IoT consulting =-
> > >>>>>
> > >>>>>
> > >>>>>
> > >>>>> ----------------------------------------------------------------
> > >>>>> ---- IETF IPv6 working group mailing list ipv6@ietf.org
> > >>>>> Administrative Requests:
> > >>>>> https://www.ietf.org/mailman/listinfo/ipv6
> > >>>>> ----------------------------------------------------------------
> > >>>>> ----
> > >>>>
> > >>>> -----------------------------------------------------------------
> > >>>> --- IETF IPv6 working group mailing list ipv6@ietf.org
> > >>>> Administrative Requests:
> > >>>> https://www.ietf.org/mailman/listinfo/ipv6
> > >>>> -----------------------------------------------------------------
> > >>>> ---
> > >>>>
> > >>
> > >> -------------------------------------------------------------------
> > >> - IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> > >> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > >> -------------------------------------------------------------------
> > >> -
> > >
> > > --------------------------------------------------------------------
> > > IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> > > Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > > --------------------------------------------------------------------
> > >
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------