Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
Andrew Campling <andrew.campling@419.consulting> Fri, 26 May 2023 14:30 UTC
Return-Path: <andrew.campling@419.consulting>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72A79C151996; Fri, 26 May 2023 07:30:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.119
X-Spam-Level:
X-Spam-Status: No, score=-6.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NEUTRAL=0.779] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=netorgft5189650.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wi1DuzAeTWn0; Fri, 26 May 2023 07:30:16 -0700 (PDT)
Received: from GBR01-LO2-obe.outbound.protection.outlook.com (mail-lo2gbr01on0628.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe15::628]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EC72C151701; Fri, 26 May 2023 07:30:15 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QBNUYC3Vxm/cw2aPytcaum1x34/3MhD+lS/BaKuAhsodzowN47nAH4Y7qSqI48EWtqnZIrcdL1yHC3ocUxti6l0MKbP/7Ky34QMRCUpeEjFRaOPLAodbXZjKYr+xS1WsqnDCupqdoYxpQmDlv5GAadLju2N6WuUyAy2eifBDSGW9iOW2xpHcDFhoS4hAooL5gRO07K3kUlg8zr0MqN3vgUpqARrRQ79bDTrWCjWObnerFnbUj8bITuOqWrvf4e2ps+EyojQYUWZJYPrJqS6QH2tE3wUlkUhFhTixU5sj7k4ucTd1sq7s/yELqba7x1gYcMyONQq+RDV/bbfbMXhJeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KcHYITHi70dmvLDzSoYvJ+VRwL7tyVXYraOeAYotlAE=; b=UI+onD6i7i8TYEl2Oq2Inv5Ch2eT/sL48sk1masPiL+UjwNltqcctWlwjrLNYBPbavweyaUR8vLn6qEZY81JWkzDAct6bV/tO8rwT1Ut/jPv/32YgcOwVsVGIh+WRXCz9SGnk4s+7vj5uycIE94dZ3xbvCw+rztfbrKjlBgyKvltrqdiCTsOOeRh1x+W6ocuW6qNolkLaTi7y+yTL3yUN0VwG+SyTdZ8AEhyvVhcqhoVbE/JAj+0zu5Ik/wxK5dCT2qd+YoJI6ZlK1dP9Alskx1Lqr2kRctblZsp+0ppK29+HxIEUx49+gRPU8Nzo+q2h4E+tp501vs6oRUzL6fnag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=419.consulting; dmarc=pass action=none header.from=419.consulting; dkim=pass header.d=419.consulting; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=NETORGFT5189650.onmicrosoft.com; s=selector1-NETORGFT5189650-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KcHYITHi70dmvLDzSoYvJ+VRwL7tyVXYraOeAYotlAE=; b=DgzOC3DhMW9tbiDUSrqhoEqmhfjitMaObjOGwJez1omF7PWmEJwKMap8IuLnyEuwsjA9g8sVomjg5qU2IEDt2GzvzEYVwXLZnKpmZRhMkafcejyKRlC97f6p59W5cyCXjq1eVlHf5C7xt3melOdfVkieTWq2v3oqi6qKaCt1G6w=
Received: from CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:196::5) by CWXP265MB5324.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:1bb::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6455.12; Fri, 26 May 2023 14:30:10 +0000
Received: from CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM ([fe80::eea4:d29a:355e:bed]) by CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM ([fe80::eea4:d29a:355e:bed%5]) with mapi id 15.20.6455.012; Fri, 26 May 2023 14:30:10 +0000
From: Andrew Campling <andrew.campling@419.consulting>
To: Warren Kumari <warren@kumari.net>, Ole Troan <otroan@employees.org>, "opsec@ietf.org" <opsec@ietf.org>
CC: Brian E Carpenter <brian.e.carpenter@gmail.com>, Albert E Manfredi <albert.e.manfredi@boeing.com>, Tom Herbert <tom@herbertland.com>, IPv6 Operations <v6ops@ietf.org>, 6man WG <ipv6@ietf.org>
Thread-Topic: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
Thread-Index: AQHZjxT4wpra9M+IXEy2KsQHDAhEVq9rckmAgAALAoCAAMaLAIAAAqwAgAAMRYCAAETusA==
Date: Fri, 26 May 2023 14:30:10 +0000
Message-ID: <CWXP265MB5153AE85D5952AAEF8419329C2479@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM>
References: <11087a11-476c-5fb8-2ede-e1b3b6e95e48@si6networks.com> <CALx6S343f_FPXVxuZuXB4j=nY-SuTEYrnxb3O5OQ3fv5uPwT8g@mail.gmail.com> <CAN-Dau1pTVr6ak9rc9x7irg+aLhq0N8_WOyySqx5Syt74HMX=g@mail.gmail.com> <a087b963-1e12-66bf-b93e-5190ce09914b@si6networks.com> <CALx6S349nNA8L5+_1hrbWayqp8GfTYypWy_SP57c_Xxams=csg@mail.gmail.com> <51a066b3-4b4c-d573-ffbe-d6b44a4f193f@gont.com.ar> <a411a1b0-c521-c456-3d44-d99a1cc0975b@gmail.com> <CWXP265MB5153E4687BE45480DBC5A531C2439@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <27d28224-0cb0-eec2-8d54-f0d175596c85@gmail.com> <f5758380-9967-b67b-744d-dc36b7b599ab@si6networks.com> <72784f8e65f34bcc9f5652c0a553c70c@boeing.com> <CALx6S373P2X-JRbCNpOCGuq_Cum0+OzJFRBkuQ64h5R52B7Dhw@mail.gmail.com> <222731ea012b4b0ebd7a51f72b5bcd40@boeing.com> <dd61024e-1bd8-ff3d-216f-22cc7600ad10@gmail.com> <CAHw9_iJyXiT=O5cMyy08bVq+U7VTtKTkR_60OfvrcCng8Joe5w@mail.gmail.com> <CC81C789-A751-43C6-9ABF-BC137B2E9803@employees.org> <CAHw9_iKhNSRX1DmUN_uXEPA95Ue9ofpbgOkxxKTtk6_k5XPXLw@mail.gmail.com>
In-Reply-To: <CAHw9_iKhNSRX1DmUN_uXEPA95Ue9ofpbgOkxxKTtk6_k5XPXLw@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=419.consulting;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CWXP265MB5153:EE_|CWXP265MB5324:EE_
x-ms-office365-filtering-correlation-id: be63a2c2-e84b-491d-c207-08db5df5b5de
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230028)(346002)(376002)(136003)(366004)(39830400003)(396003)(451199021)(44832011)(38100700002)(9686003)(6506007)(38070700005)(122000001)(186003)(26005)(83380400001)(55016003)(478600001)(2906002)(71200400001)(86362001)(7696005)(54906003)(110136005)(66946007)(66556008)(64756008)(66476007)(66446008)(76116006)(316002)(4326008)(41300700001)(8936002)(8676002)(33656002)(52536014)(5660300002)(46492015)(221023011); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: xNlFmzWQoz0oSBr77nbkeYiHAfcItbMEXcFl7gKycDC6UIRPGxhT3hXbdVNQHjRp5cN4hC0O1lk3Us1MLskQK13l6ioBjrHzXxGpul/VKTUlvh0SPKWiDNIUH/qtQx/MKppZsbw5S02hmhxB0ToG7U3lD0NRkE7No0egNfocbSd7TctjKgGKwor7hAfZFhQkr4DQ1pTUZM6jIEKy1FLB5+6+AUDPOQpt2jzYYLn06m6yGcFB0bFuagVx9HP9azQNKhDHDmUKTA9/uHLi8MiH2Qx0ICXU5XqIiPZKLewg9no0GRNca4p06jCucpQg6kenX4Y6l4bVJngOb+hYna6JTU14cGlvj5LSc5DebcH2sN9s4OwmJCFEZnv2vpx1rv9WTYZrbmKpXhqNsLU9zuKFwhWza/PTBBPi9C8LxuFW26WD0h2RZBocPlxB9H3bPbFfkdKfUjzajgw7qqNDxryUJsrkTNyob9Wh/Csrlu1eh/lObaAGkWXv9hWTQbS/6gizR41xxupAgALX2bsQc1ZsTQkdEhgAOdR3vsj3xjfJWXD8RZPkOGwZvUtouC/geXirqX3Wz82uRDQJhFa1hOD+bZy80o/Tx9Qkkf4y2jzpw6/BVH62RQ38j4IvDOqrEzbCiiJiu+u38133hUksnIZpYL/GTTjZqvosEpv9FrAN0eOjM/i14mQiqrtMJxOPPqedfpy895tPtlUIrEQePki5WLQwzvvluiFILvwQiTYvhvy0mBypHVFof/WNUAvJjZbYuz0dkOr7u5Ci68dUUzDrRb5zaqV4qiiCDIZ/WG8UpUY21Q+EmlplsJgrglZJB+c67rLvcWWUqahzPkXIKAqHlNxGtIMuIVBhXlNbUk4a37XnWJlWITNkpPcu+GbxM18suLKEdW94wYewjEK1tdT/xkuq50dZ0iwur1a9XVEKEB374ozxIbH7tqAdYvybREhHYpKeVbsYE2kn8SjlXIiDJpxGXfk4vh7rvS1nD3ry1rDrPDjQ0HszbUz6jP2qIBvKIbG9DvgTIk5A+wg4Iv9Z4KcGnvPgkWXtoAFb0Kmd9dSFBbJhLP88IdB5H7NRUyOkw5MTU/Vcgzr2+AusasD72kKnxJanZzKWIxakPdKLonsL2uC19lD7DXzpQfxo6Iik7Iq7rE344JBsn0TRocipQEk8NDO+9GnLM47M47ReSdaOEYKxK8QuOwvKdHrFKe1soTdFN/9A4dVNaC27XvZFv367GYHf2kUOulDrYV5LIlJfekBKfcfr8imbiJMJtlzH3FqJ5U7zEzBEZB6/gxQW0FRN9AUq+kJDisaGUgPOfWO9MKKMC9lJBVF1S1AKct52AYEJG8U+Xvg/QsW9OIwvKwoWELT2rPO3+vJtJwWYYZzcL4LmP22fLJw2AATOa1lYzVussiNNd1ElFCrgD+Tn8EHmBf+GSg8uTjovSeQWoupvQcpQxnVF14u3g2pz6GDZ8lYScnJ09DNVtP/c+Oqu0RM7R7LdfJG3jA1mt2ebf4wQFvQaqsJrPiayRIg0dSJQRLAPid3G24d/NOQJJTi5Pn9C7kAFQAFsbu9yDa4mhLeBNRsbbncpl25DELFHFVI/pZQ1+odEGpBrKd869ywZfQ==
Content-Type: multipart/alternative; boundary="_000_CWXP265MB5153AE85D5952AAEF8419329C2479CWXP265MB5153GBRP_"
MIME-Version: 1.0
X-OriginatorOrg: 419.consulting
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: be63a2c2-e84b-491d-c207-08db5df5b5de
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 May 2023 14:30:10.2677 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9c2ced3e-7522-4755-87dc-f983abc66ec3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t3PRs18EuzcvuE6zoScFgWC+8caZuQ3UGj5Y/CqMtDxjidLJsXPslupEWLWJ3cJrSnaiJMDxteCA88pXolxshb+qOBFDus80Mmvad7v0vCQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CWXP265MB5324
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/bbmjD8eUqowbe-gGuL6HTGRnytE>
Subject: Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 May 2023 14:30:19 -0000
This is a really good thread! For me, it highlights that there appears to be a gulf in understanding, or at least working assumptions, between developers and those responsible for network (public or private) security. I suspect that gulf might narrow somewhat if developers faced some of the same consequences that enterprises and public network operators face in the event of security breaches – I’m thinking here about those with compliance obligations such as the finance sector, those in areas defined as part of critical national infrastructure and those covered by more general regulations such as NIS2. Greater involvement by enterprise and public network CISOs would help inject more understanding of current practice security and operational considerations into protocol development activity to augment the input of those within this community that also have that knowledge. For example, it would be good to see the reaction of CISOs to suggestions that security should be left to hosts / endpoints rather than using a defence-in-depth approach which also employs network and perimeter defences, looks for indicators of compromise etc. Given the relative lack of diversity within the IETF community, hindsight suggests to me that it would have been great to see one or more IETF-sponsored panel discussions at events like the recent RSA Conference to debate some of the points raised on this thread with the wider security practitioner community, many of whom don’t follow developments at the IETF (I can confirm this latter point from personal experience as I asked other attendees at RSAC 23 and found less than a handful of people that had involvement in the IETF, either directly or via a team member). Andrew
- [OPSEC] Why folks are blocking IPv6 extension hea… Fernando Gont
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Ted Lemon
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… David Farmer
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Jen Linkova
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Vasilenko Eduard
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Andrew Campling
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Andrew Campling
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [OPSEC] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Dale W. Carder
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Ackermann, Michael
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Xipengxiao
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Michael McBride
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Ackermann, Michael
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Brian E Carpenter
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Ole Troan
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Haisheng Yu
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Andrew Campling
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Bob Natale
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Ole Troan
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [EXT] Re: [v6ops] [IPv6] Why folks ar… Bob Natale
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… David Farmer
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Michael Richardson
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Ole Trøan
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Ole Troan
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… David Farmer
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Ole Troan
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Brian E Carpenter
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Michael Richardson
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Brian E Carpenter
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Brian E Carpenter
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… hsyu
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Manfredi (US), Albert E
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Fernando Gont
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Arnaud Taddei
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Vasilenko Eduard
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Arnaud Taddei
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Vasilenko Eduard
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Arnaud Taddei
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… nalini.elkins@insidethestack.com
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Manfredi (US), Albert E
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Brian E Carpenter
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Manfredi (US), Albert E
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Bob Natale
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Haisheng Yu
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Warren Kumari
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Ole Troan
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Warren Kumari
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Andrew Campling
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Fernando Gont
- Re: [OPSEC] [IPv6] [v6ops] [EXTERNAL] Re: Why fol… Fernando Gont
- Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Fernando Gont
- Re: [OPSEC] [IPv6] [v6ops] [EXTERNAL] Re: Why fol… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Clark Gaylord
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Fernando Gont
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Manfredi (US), Albert E
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Brian E Carpenter
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Brian E Carpenter
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Tom Herbert
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Manfredi (US), Albert E
- Re: [OPSEC] [v6ops] [EXTERNAL] Re: [IPv6] Why fol… Andrew Alston
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Tom Herbert
- Re: [OPSEC] [EXTERNAL] Re: [IPv6] [v6ops] Why fol… Andrew Campling
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Tom Herbert
- Re: [OPSEC] [IPv6] [v6ops] Why folks are blocking… Dirk Trossen
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Mike Simpson
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Haisheng Yu
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Nick Hilliard
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Fernando Gont
- Re: [OPSEC] [IPv6] [EXTERNAL] Re: [v6ops] Why fol… Bob Natale