Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
Brian Haberman <brian@innovationslab.net> Wed, 20 March 2024 15:22 UTC
Return-Path: <brian@innovationslab.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16E57C1CAF4F for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 08:22:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.904
X-Spam-Level:
X-Spam-Status: No, score=-6.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=innovationslab-net.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCrhsKBqLE_7 for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
Received: from mail-oi1-x229.google.com (mail-oi1-x229.google.com [IPv6:2607:f8b0:4864:20::229]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AA2FC1CAF45 for <pim@ietf.org>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
Received: by mail-oi1-x229.google.com with SMTP id 5614622812f47-3c39579af51so563b6e.3 for <pim@ietf.org>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=innovationslab-net.20230601.gappssmtp.com; s=20230601; t=1710948167; x=1711552967; darn=ietf.org; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:from:to:cc:subject :date:message-id:reply-to; bh=neMR/FkIbMcM63t4w5hLHTLb3OuUTXjfqco0jL+eE28=; b=cyQyI7MUiOrwYrqwxfd4DgGkSPniQJxmh9y2h3UJHdBLgn+gRY6hxXtZeBQHRmmJBt ZrcbDkjpO8whUZLrDSWCTg3/n+8it0NdnLDNDTJsjeRHnzDxUEVgP22YD1XdlTW44iSw WiuKmJAZ5G687zMtqD/POBUW72ElJTZ4h5/FEerEoUaDAq/lDuulERIjzPOIo9wje6fd 93QU8TnUAW/Ml/orYe6u18xGOE7NukQatGyU8YzsR++zOIa5j3csLD3YHSmd3vrWz/KZ CHNjBY+4D4NPnxpEdgAoFRHwqLLCz8qJ0cjYU+EMwGbGwiHiOaxfBSp2lnAqHkEOjVA6 5xlg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710948167; x=1711552967; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=neMR/FkIbMcM63t4w5hLHTLb3OuUTXjfqco0jL+eE28=; b=W5qeZQIWoqWQmkGobVtYyBrJmKskK4hebyYDC+ko93d8JusO2z9rRyPCk8LIRABZPs RCwjcvVuLi9UKqPC0ge9sr2mD4KiF3AxC2Xgzp5uczmyGaM9g6mvMScat9GXtIwZNbAN d5xcapC/K09iwNfNoQgIn0OmcIUU06Q6z7hOs8EkuCVVitXFmI9jU7FI7BKX5mlbrR2a GNxcevYbm0Q3uZjOOs3bHlkJA0M4vYBSFFRebbTYtvkdIeLv5xyJ72sZHilUZ3/hj2iE Uw6SIYcsvp6EhbnJdvh/tFEUTuYd6w/NteyI40h//7TIisu86I4WPLdVQqI9rKIm8Ygl kH9g==
X-Forwarded-Encrypted: i=1; AJvYcCUXV5b/z3Gl+4MbxRGuEU2kD73RiHDfXFxVX091mLc5YTHIGqcp96w02V579+FNQt2b9XwYHLiVkkRPc4g=
X-Gm-Message-State: AOJu0Ywv48lDINlx6obOsUFhm3PwHn6FYmxQuAYl7BBSCbWJTqvbk3OG 6jSjvyZF8dAkMdxwypVIS5r3b1a4IaU141WZrP/ic3KFRDk1CGN4esYj7dRxIzc=
X-Google-Smtp-Source: AGHT+IEkgy6kEwTMfV4HC+wDsjbU+MVd3iaAviogLmKfHOyPg7xdss0EHh3UTt/z2An6upiw3I8iyg==
X-Received: by 2002:a05:6808:149:b0:3c3:a69d:c0be with SMTP id h9-20020a056808014900b003c3a69dc0bemr996805oie.48.1710948167097; Wed, 20 Mar 2024 08:22:47 -0700 (PDT)
Received: from [192.168.1.4] ([172.58.203.154]) by smtp.gmail.com with ESMTPSA id fw6-20020a05622a4a8600b0042f21b795d0sm3500674qtb.45.2024.03.20.08.22.45 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 20 Mar 2024 08:22:46 -0700 (PDT)
Message-ID: <8c620ad0-2174-4cc4-9df9-5940e1225fac@innovationslab.net>
Date: Wed, 20 Mar 2024 11:22:44 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Stig Venaas <stig@venaas.com>
Cc: Leonard Giuliano <lenny@juniper.net>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>, Toerless Eckert <tte@cs.fau.de>, "zzhang@juniper.net" <zzhang@juniper.net>, "n.leymann@telekom.de" <n.leymann@telekom.de>, "pim@ietf.org" <pim@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>, "fenner@fenron.com" <fenner@fenron.com>, Dave Katz <dkatz@juniper.net>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com>
From: Brian Haberman <brian@innovationslab.net>
Autocrypt: addr=brian@innovationslab.net; keydata= xsFNBGFCWtIBEAC2FIgMIrH27l4L1Uu+vxCBakOv0Y1nxsu61+aulA78two2kCl7OCF+myP8 KQHEFMoZSn+ZvR+QDFyhsHe7qDK0CVf1K3n97PptXG5kvbnDJdwVJV0w9zYC17/VDgGAKLqj 0iNDVc9mYg/zCYdPn616UAj7hNpFgc9f982gLokyR/xbMNvtOwOpToysK+7Oc25oOam0xuUx CHcE4BfzJHO2VmUgWHeTvxervtIeMcn5PUlQ4XhzYH88mLlI1Uno7W5Dfx8FjXLNNAq4aNBM 6QND2LRekYi75pSTFXNpYIZvmgVT/VB6SHpsyJ3Hkio4YqGkPiqCEcB6U1lArT2FmXnzsTOt 6ydx6ONClxtcOmoEWrES+8tU+knaCEo1/XOrWtivTFMzn3Mahf726XxQBG55FkhqQ/Mir70e mTtpm8MDf+Qj4o5OsSF01l0MMxwOPiB57pz+XuUoWvLEjLgnb83eY0/YpBJdYESL3zZ3zMBo zA65cUozqSGHwQnlE1ACRDKhsReSYmiPJR5o3pWvNf5z+1M3tyn4qpuPxFFA1X8tEstpoC9t QoX8oextRj9BXlJCcCOwSVbCN8buO7aJMN3PIwSewjYvNLMxLrMph/8jNAHIaZnIt3CRHAq6 RsEAv8VQBWruIyNyyX0N8upnOpvriqx1eI2yS/B/Z2D8fQoFewARAQABzSlCcmlhbiBIYWJl cm1hbiA8YnJpYW5AaW5ub3ZhdGlvbnNsYWIubmV0PsLBlAQTAQgAPhYhBKm74/fFK6tXux1c k5E020tPLWqqBQJhQlrSAhsDBQkHhh8tBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEJE0 20tPLWqq9fAP/1BO1H3SxphcXPbIsuJ+LoBCoKhrIftwGrLZzyiHYyLSFJ/HWLH2Kv79XJP4 6GkpTCk3VfJp6LEjw9FItwXUn0BEf0LyEy1L7w81YXPq+e4kwTPaQI8CgnbpSS9HBkcUj2r9 bwCjf+QZMqfgbz4d2MkVdVrIM2XPLYQND+Xtu1tyTTnrvFndLQFkDdqHAM9HqoikoNqWqz5j JPaxpJfxqmWr86vNThI7sD0rgMX5TWj7Flngzv2G9/uGEz4rHOIwK6KKiXNKk79kTqjUCQ9j tXl8BC2LQj8xsnWeGISTMR3xbiBPeTX94686O6KcLl7QIVKVS+nqs2l2j2gaXo1AjhBXO7gP GFN+rZzPOUZnPQUek3FeQoZCkfC/ljWBPooCpBe2euv5uZ4NbfKHAr9nmmhg4Uh1IceMxMQ/ /kB2wXTbuoprWLkK02r/y9LyGI5zLqLNl0NG17erJ0NCke76xYJkKBYezgBj1pZmYQDC1Sox fKlsaFCWkBrcKuGWc49qbEtWVM8h/mw+0w5pFyKX733xa6A+S8TOPYng/qFYgauotV9unjjt b7Npn7XyYzypk7QqKo4zipBqpHKeQ96Y/FKXSHPuTVj7dGK3Dn4b0q9Dgti7ogCc8F3tJcZI E0R8Q+4TRcQ192dLvyyTrv4h9BY6q5aB56Z6dsn11TAx7YCAzsFNBGFCWtIBEACqN6OFHSNq jiPy8s05QTC2fCqi0G5CcbRFXcqmHDEKdwqHk5VuOEL8CcWKNzOEMCt6EJvNL4ivfeHs1e7f rfm08+0Da0xAFiab92B9lOTLfv/NkKZ3jakQs06rtSzX7tYDbnmDeX206Uqff1mDjsiXHoAJ fdW7CjNLdWp42B3fkSjUR8mUgeNPqO4Jhgd7d3tTN2ov7M0rS7kUoE6Gd01LmNoPUQ024g8G ecMXVBldgg78aKmehs5pSWLmoBfczymGmNT/++9B6btmy7ruU+febVXRaQJY7aqpkTL7oy4H 3LMRSy/0BXHm1WgO7201Aj7PuaXM424hAhzmAJhO5AvlT9PuS9eSaIP0sqgP7ZTX7UezVj1H Tv5VJtgHI1fiNfhd/KFqDQDGaKdlM0iysyPanSCscjsWqAG0Od2TPdSuURqvgt8suBZrAAfK d55Ovguy+8uCi047sQxShUonw7TxGl3FMAe04PBIOgMCB/uys4yDUjYrawrlNigvx60Nec+T ExE+qszoO57If3/rG78J2ntGjog+yTDNffkbzljcy3YDe3k/r+T2FKOcWxJTlwSWAs1aVLZ7 DWx73lpYrSNJxiU7PrPihfS/Doy3VfmfF/RbH/xmkuPvsyrVfd16pEEtHGi5hBk2KQyjVqi1 IWwXV9ZVOQFBE9nJ7i6A7Aw3EwARAQABwsF8BBgBCAAmFiEEqbvj98Urq1e7HVyTkTTbS08t aqoFAmFCWtICGwwFCQeGHy0ACgkQkTTbS08taqrpIBAAjc6GdUjCyVsZLYwV8bMM4loltFrx z/mroCIFW4PZ0u4zENaloQbHuhDx7Ii6mR9jRiVNbXP4XvuyhjlUO+pt6hGrPbzsmV9vGvN0 2nkGYmSpxQNEzHQf/CJyLhPWY5qTJlDEr4zHbloG2KRPQ6dv9mdRIyAwDxNDSq2tVlrJC+b4 hG9vYp9msCZspqVDRTzvRTZQoWAvGJUaUgZd/FLPTfFePAmX+enXkUKl332i82xNU/nTix73 WajK7WhWC2GugrEbi42fJgUKRtYWhY36QyxucB1VWUacn7iKt/eLfPrCVVsHP2j4vqjlL/HJ 38TvbqfI4WbXyXF630U7IOlMT8//vpo3Y8hjWw0p5dm22fyPcjfnqxDdDefKCJpN215JgvDi Ww42J+VDTsd+5FJYCSUqg3jXmJl1z6FewF5hjuUGf/VdKCrhFocfh1b8VFgne2M1vyNcPoS8 23lJOMpcVAmzFhmVl5y/az/kgPJzbQggSByv3pZZUlJttLKf9BSGwmKcoGEgNo8p/DUyMkQV kVCJdmnamJzYEa/s3XRasTZhoWzNSjIEfeJaLd8dVXTzByMzgYuj/raFP1UF33GQ8W+zr23b VLVc8pEjMQlWeRGfJRyvG4ZOYpFk0c7jw8LpERCd/1SGHL3RQ3CwOqouQgKV+0BjMbY6A6Vj CuWio7k=
In-Reply-To: <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------8AsbXD1u0m0g9muLb8gC2OmJ"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/B95JHsreP6qQrcJgEIBmbhE15Ek>
X-Mailman-Approved-At: Wed, 20 Mar 2024 16:15:09 -0700
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2024 15:22:53 -0000
Hey Stig, Unfortunately, I will not be able to join the meeting as I will be on an airplane... I think you should note on slide 3 what the impact of each approach would have on advancing the spec to Internet Standard. To do that correctly, I think you have to break the last recommendation into two (add a recommendation, mandate a change). Personally, it seems like most of the scenarios posited have been related to old kit or mis-configuration. We can't standardize away those types of actions. At best, I think we can add recommended default settings for the compatibility mode variables referenced in section 7. Regards, Brian On 3/19/24 8:34 PM, Stig Venaas wrote: > Hi all > > We have an agenda slot to discuss this here in Brisbane. Please join, > in person or remotely to help us make the right decision. > > You can see my proposed slides here > https://datatracker.ietf.org/meeting/119/materials/slides-119-pim-rfc3376bis-v2-querier-fallback-issue-00 > > Let me know if you think this is inaccurate in any way or if there are > important points we need to add. I know myself and others have > different thoughts on this, it was hard resisting putting my own > opinions in the slides. I plan to raise them as a participant at the > meeting. Hope many of you can take part in the meeting as well. > > Anyone from mboned seeing this, you are of course welcome to join as well. > > Brian, are you able to join? > > Thanks, > Stig > > On Tue, Jan 2, 2024 at 5:39 AM Brian Haberman <brian@innovationslab.net> wrote: >> >> Lenny's assessment is correct from my perspective. Section 7.3.2 >> specifies that IGMP version compatibility is kept on a per-group basis. >> This should preclude compliant routers from disabling SSM service in the >> SSM address range. >> >> Section 7.3.1 discusses the compatibility mode configuration option for >> IGMPv3 routers, but there is not a recommended default setting for that >> option. >> >> Are there aspects of RFC 4604 that people think need to be updated? >> >> Regards, >> Brian >> >> On 12/19/23 4:09 PM, Leonard Giuliano wrote: >>> >>> As I understand, RFC4604 explicitly prevents SSM service from being killed >>> by the presence of an IGMPv1/2 host (assuming the router is SSM aware, >>> which in 2023 is a fairly valid assumption). That is bc the router should >>> ignore any v1/v2 reports in the ssm range (232/8). And as I understand, >>> RFC3376 Sect 7.3.2 provides backwards compatibility for v1/2 hosts, but >>> only on a *per-group* basis- not for the whole LAN. >>> >>> Combining the two, SSM service is protected in SSM range (232/8). In >>> non-SSM range, due to backward compat, you could lose SSM behavior- but >>> since you are in non-SSM range, all bets were off in the first place. >>> >>> So unless I'm missing something, I don't see see the risk of SSM being >>> killed by v3 backwards compatibility. Adding DKatz, who know this stuff >>> way better than me in case I misinterpreted any of these specs. >>> >>> >>> -Lenny >>> >>> On Mon, 18 Dec 2023, Holland, Jake wrote: >>> >>> | >>> | On 12/14/23, 1:29 PM, "pim on behalf of Toerless Eckert" <pim-bounces@ietf.org <mailto:pim-bounces@ietf.org> on behalf of tte@cs.fau.de <mailto:tte@cs.fau.de>> wrote: >>> | > The elephant IMHO is that rfc3376bis is so far not including changes to IGMPv3 behaviors >>> | > about backeward compatibility with v1/v2 routers on the LAN, and exactly this behavior is >>> | > killing SSM in deployment because any such router when it becomes querier will kill SSM >>> | > ... because hosts will revert to v1/v2 and not report their SSM (S,G) memberships. >>> | >>> | +1, this is a serious problem. The current default behavior bakes a DOS for SSM into the >>> | protocol. >>> | >>> | > If there are routers that have config options to disable this backward compatibility with >>> | > older routers, i would love to learn about it. >>> | >>> | When using linux routing there is `sysctl net.ipv4.force_igmp_version=3`, but it says because >>> | of the difference in the security considerations between MLD and IGMP it doesn't actually >>> | ignore v1 and v2 even when it's set: >>> | https://urldefense.com/v3/__https://sysctl-explorer.net/net/ipv4/force_igmp_version/__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZENUoioNQ$ >>> | >>> | (MLD permits an "ignore v1 completely" setting, but says it should only be used when >>> | source filtering is critical: >>> | https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc3810*section-10.2__;Iw!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZEHCk8UTw$ ) >>> | >>> | > - Replace with something like: >>> | > >>> | > This revision of IGMPv3 version 3 removes automatic fallback to IGMP version 2 and version 1 >>> | > routers on the same network as specified in [RFC3376]. Instead, >>> | > such older version router behavior MUST be explicitly configured. >>> | >>> | While I agree that to the greatest extent we can induce, IGMPv3 queriers from now >>> | on should maintain the capability to propagate SSM and accept IGMPv3 membership >>> | reports under all circumstances (even when there is an IGMPv1 or v2 receiver on the >>> | LAN), I'm not sure it makes sense to ship text that makes all the currently deployed >>> | routers retroactively non-compliant with a MUST in the new IGMPv3. >>> | >>> | But I'd support adding a section that describes the problem and provides a well- >>> | justified and strong recommendation that the default behavior be changed from >>> | what's in RFC 3376 and that a config option be provided to ignore IGMPv1 and v2 >>> | packets, like with MLD. >>> | >>> | It might be worth saying something like now that we have RFC 8815 and in light of >>> | the experimental status of RFC 3618 (MSDP) and its deployment BCP in 4611, source >>> | filtering should always be considered critical for clients that support it? (Not sure that's >>> | necessary, just a brainstorming idea to point to some of the docs that cover new >>> | operational experience since 3376...) >>> | >>> | > IGMPv3 routers MUST have a configuration option, disabled by default, to operate >>> | > as an IGMPv2 router. When enabled, all procedures of [RFC2236] apply. Configuring this >>> | > option is necessary in the presence of non-IGMPv3 capable IGMP snooping switches or >>> | > PIM routers. These are rare but may still be depoyed. >>> | > >>> | > When operating in IGMP version 3, routers MUST ignore version 1 and version 2 queries. >>> | > In version 3, the presence of those older version queries constitutes a misconfiguration >>> | > or attack, and these messages SHOULD result in logging of an error (rate-limited). >>> | > >>> | > - And in an appropriate part of the host behavior: >>> | > >>> | > IGMP version 3 hosts MUST have a configuration option, disabled by default, to ignore >>> | > IGMP version 1 and version 2 queries. This option SHOULD be auto-enabled when the host >>> | > is running SSM receiver applications, and hence depends on IGMP version 3 to operate in the >>> | > network. >>> | > >>> | > This is about as much as i think we can do if we still want to go full standard with rfc3376bis. >>> | > I can think of no operational deployment where the introduction of devices with existing >>> | > older RFC compatibility would cause interoperability issues. At worst the new router would >>> | > need to be explicitly configured for IGMPv2, which in my experience most routers deployed >>> | > into IGMPv3 environments are done anyhow. >>> | > >>> | > Comments welcome. Would love to see positive replies in which case i will be happy to explicitly >>> | > sugest the text changes for this elephant issue to the draft. >>> | >>> | Thanks for raising this, Toerless, the IGMP downgrade problem has been a major source of pain >>> | for some deployments that rely on SSM. >>> | >>> | - Jake >>> | >>> | >>> | _______________________________________________ >>> | MBONED mailing list >>> | MBONED@ietf.org >>> | https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZG9c7AK9g$ >>> |
- [pim] pim wglc for 3228bis, 3376bis and 3810bis Stig Venaas
- Re: [pim] pim wglc for 3228bis, 3376bis and 3810b… Stig Venaas
- Re: [pim] pim wglc for 3228bis, 3376bis and 3810b… Jeffrey (Zhaohui) Zhang
- Re: [pim] pim wglc for 3228bis, 3376bis and 3810b… Toerless Eckert
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] IGMPv3 backward compatibility issue kil… Holland, Jake
- Re: [pim] WGLC feedback for draft-ietf-pim-3376bi… Toerless Eckert
- Re: [pim] IGMPv3 backward compatibility issue kil… Toerless Eckert
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Toerless Eckert
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Toerless Eckert
- [pim] WGLC feedback for draft-ietf-pim-3376bis (w… Toerless Eckert
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- [pim] IGMPv3 backward compatibility issue killing… Toerless Eckert
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Leonard Giuliano
- Re: [pim] pim wglc for 3228bis, 3376bis and 3810b… Brian Haberman
- Re: [pim] pim wglc for 3228bis, 3376bis and 3810b… Stig Venaas
- Re: [pim] WGLC feedback for draft-ietf-pim-3376bi… Toerless Eckert
- Re: [pim] WGLC feedback for draft-ietf-pim-3376bis Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Dave Katz
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Dave Katz
- Re: [pim] IGMPv3 backward compatibility issue kil… N.Leymann
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … N.Leymann
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Leonard Giuliano
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Brian Haberman
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Stig Venaas
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda
- Re: [pim] [MBONED] IGMPv3 backward compatibility … N.Leymann
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Leonard Giuliano
- Re: [pim] [MBONED] IGMPv3 backward compatibility … Hitoshi Asaeda