Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM

Brian Haberman <brian@innovationslab.net> Wed, 20 March 2024 15:22 UTC

Return-Path: <brian@innovationslab.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16E57C1CAF4F for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 08:22:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.904
X-Spam-Level:
X-Spam-Status: No, score=-6.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=innovationslab-net.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCrhsKBqLE_7 for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
Received: from mail-oi1-x229.google.com (mail-oi1-x229.google.com [IPv6:2607:f8b0:4864:20::229]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AA2FC1CAF45 for <pim@ietf.org>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
Received: by mail-oi1-x229.google.com with SMTP id 5614622812f47-3c39579af51so563b6e.3 for <pim@ietf.org>; Wed, 20 Mar 2024 08:22:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=innovationslab-net.20230601.gappssmtp.com; s=20230601; t=1710948167; x=1711552967; darn=ietf.org; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:from:to:cc:subject :date:message-id:reply-to; bh=neMR/FkIbMcM63t4w5hLHTLb3OuUTXjfqco0jL+eE28=; b=cyQyI7MUiOrwYrqwxfd4DgGkSPniQJxmh9y2h3UJHdBLgn+gRY6hxXtZeBQHRmmJBt ZrcbDkjpO8whUZLrDSWCTg3/n+8it0NdnLDNDTJsjeRHnzDxUEVgP22YD1XdlTW44iSw WiuKmJAZ5G687zMtqD/POBUW72ElJTZ4h5/FEerEoUaDAq/lDuulERIjzPOIo9wje6fd 93QU8TnUAW/Ml/orYe6u18xGOE7NukQatGyU8YzsR++zOIa5j3csLD3YHSmd3vrWz/KZ CHNjBY+4D4NPnxpEdgAoFRHwqLLCz8qJ0cjYU+EMwGbGwiHiOaxfBSp2lnAqHkEOjVA6 5xlg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710948167; x=1711552967; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=neMR/FkIbMcM63t4w5hLHTLb3OuUTXjfqco0jL+eE28=; b=W5qeZQIWoqWQmkGobVtYyBrJmKskK4hebyYDC+ko93d8JusO2z9rRyPCk8LIRABZPs RCwjcvVuLi9UKqPC0ge9sr2mD4KiF3AxC2Xgzp5uczmyGaM9g6mvMScat9GXtIwZNbAN d5xcapC/K09iwNfNoQgIn0OmcIUU06Q6z7hOs8EkuCVVitXFmI9jU7FI7BKX5mlbrR2a GNxcevYbm0Q3uZjOOs3bHlkJA0M4vYBSFFRebbTYtvkdIeLv5xyJ72sZHilUZ3/hj2iE Uw6SIYcsvp6EhbnJdvh/tFEUTuYd6w/NteyI40h//7TIisu86I4WPLdVQqI9rKIm8Ygl kH9g==
X-Forwarded-Encrypted: i=1; AJvYcCUXV5b/z3Gl+4MbxRGuEU2kD73RiHDfXFxVX091mLc5YTHIGqcp96w02V579+FNQt2b9XwYHLiVkkRPc4g=
X-Gm-Message-State: AOJu0Ywv48lDINlx6obOsUFhm3PwHn6FYmxQuAYl7BBSCbWJTqvbk3OG 6jSjvyZF8dAkMdxwypVIS5r3b1a4IaU141WZrP/ic3KFRDk1CGN4esYj7dRxIzc=
X-Google-Smtp-Source: AGHT+IEkgy6kEwTMfV4HC+wDsjbU+MVd3iaAviogLmKfHOyPg7xdss0EHh3UTt/z2An6upiw3I8iyg==
X-Received: by 2002:a05:6808:149:b0:3c3:a69d:c0be with SMTP id h9-20020a056808014900b003c3a69dc0bemr996805oie.48.1710948167097; Wed, 20 Mar 2024 08:22:47 -0700 (PDT)
Received: from [192.168.1.4] ([172.58.203.154]) by smtp.gmail.com with ESMTPSA id fw6-20020a05622a4a8600b0042f21b795d0sm3500674qtb.45.2024.03.20.08.22.45 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 20 Mar 2024 08:22:46 -0700 (PDT)
Message-ID: <8c620ad0-2174-4cc4-9df9-5940e1225fac@innovationslab.net>
Date: Wed, 20 Mar 2024 11:22:44 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Stig Venaas <stig@venaas.com>
Cc: Leonard Giuliano <lenny@juniper.net>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>, Toerless Eckert <tte@cs.fau.de>, "zzhang@juniper.net" <zzhang@juniper.net>, "n.leymann@telekom.de" <n.leymann@telekom.de>, "pim@ietf.org" <pim@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>, "fenner@fenron.com" <fenner@fenron.com>, Dave Katz <dkatz@juniper.net>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com>
From: Brian Haberman <brian@innovationslab.net>
Autocrypt: addr=brian@innovationslab.net; keydata= xsFNBGFCWtIBEAC2FIgMIrH27l4L1Uu+vxCBakOv0Y1nxsu61+aulA78two2kCl7OCF+myP8 KQHEFMoZSn+ZvR+QDFyhsHe7qDK0CVf1K3n97PptXG5kvbnDJdwVJV0w9zYC17/VDgGAKLqj 0iNDVc9mYg/zCYdPn616UAj7hNpFgc9f982gLokyR/xbMNvtOwOpToysK+7Oc25oOam0xuUx CHcE4BfzJHO2VmUgWHeTvxervtIeMcn5PUlQ4XhzYH88mLlI1Uno7W5Dfx8FjXLNNAq4aNBM 6QND2LRekYi75pSTFXNpYIZvmgVT/VB6SHpsyJ3Hkio4YqGkPiqCEcB6U1lArT2FmXnzsTOt 6ydx6ONClxtcOmoEWrES+8tU+knaCEo1/XOrWtivTFMzn3Mahf726XxQBG55FkhqQ/Mir70e mTtpm8MDf+Qj4o5OsSF01l0MMxwOPiB57pz+XuUoWvLEjLgnb83eY0/YpBJdYESL3zZ3zMBo zA65cUozqSGHwQnlE1ACRDKhsReSYmiPJR5o3pWvNf5z+1M3tyn4qpuPxFFA1X8tEstpoC9t QoX8oextRj9BXlJCcCOwSVbCN8buO7aJMN3PIwSewjYvNLMxLrMph/8jNAHIaZnIt3CRHAq6 RsEAv8VQBWruIyNyyX0N8upnOpvriqx1eI2yS/B/Z2D8fQoFewARAQABzSlCcmlhbiBIYWJl cm1hbiA8YnJpYW5AaW5ub3ZhdGlvbnNsYWIubmV0PsLBlAQTAQgAPhYhBKm74/fFK6tXux1c k5E020tPLWqqBQJhQlrSAhsDBQkHhh8tBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEJE0 20tPLWqq9fAP/1BO1H3SxphcXPbIsuJ+LoBCoKhrIftwGrLZzyiHYyLSFJ/HWLH2Kv79XJP4 6GkpTCk3VfJp6LEjw9FItwXUn0BEf0LyEy1L7w81YXPq+e4kwTPaQI8CgnbpSS9HBkcUj2r9 bwCjf+QZMqfgbz4d2MkVdVrIM2XPLYQND+Xtu1tyTTnrvFndLQFkDdqHAM9HqoikoNqWqz5j JPaxpJfxqmWr86vNThI7sD0rgMX5TWj7Flngzv2G9/uGEz4rHOIwK6KKiXNKk79kTqjUCQ9j tXl8BC2LQj8xsnWeGISTMR3xbiBPeTX94686O6KcLl7QIVKVS+nqs2l2j2gaXo1AjhBXO7gP GFN+rZzPOUZnPQUek3FeQoZCkfC/ljWBPooCpBe2euv5uZ4NbfKHAr9nmmhg4Uh1IceMxMQ/ /kB2wXTbuoprWLkK02r/y9LyGI5zLqLNl0NG17erJ0NCke76xYJkKBYezgBj1pZmYQDC1Sox fKlsaFCWkBrcKuGWc49qbEtWVM8h/mw+0w5pFyKX733xa6A+S8TOPYng/qFYgauotV9unjjt b7Npn7XyYzypk7QqKo4zipBqpHKeQ96Y/FKXSHPuTVj7dGK3Dn4b0q9Dgti7ogCc8F3tJcZI E0R8Q+4TRcQ192dLvyyTrv4h9BY6q5aB56Z6dsn11TAx7YCAzsFNBGFCWtIBEACqN6OFHSNq jiPy8s05QTC2fCqi0G5CcbRFXcqmHDEKdwqHk5VuOEL8CcWKNzOEMCt6EJvNL4ivfeHs1e7f rfm08+0Da0xAFiab92B9lOTLfv/NkKZ3jakQs06rtSzX7tYDbnmDeX206Uqff1mDjsiXHoAJ fdW7CjNLdWp42B3fkSjUR8mUgeNPqO4Jhgd7d3tTN2ov7M0rS7kUoE6Gd01LmNoPUQ024g8G ecMXVBldgg78aKmehs5pSWLmoBfczymGmNT/++9B6btmy7ruU+febVXRaQJY7aqpkTL7oy4H 3LMRSy/0BXHm1WgO7201Aj7PuaXM424hAhzmAJhO5AvlT9PuS9eSaIP0sqgP7ZTX7UezVj1H Tv5VJtgHI1fiNfhd/KFqDQDGaKdlM0iysyPanSCscjsWqAG0Od2TPdSuURqvgt8suBZrAAfK d55Ovguy+8uCi047sQxShUonw7TxGl3FMAe04PBIOgMCB/uys4yDUjYrawrlNigvx60Nec+T ExE+qszoO57If3/rG78J2ntGjog+yTDNffkbzljcy3YDe3k/r+T2FKOcWxJTlwSWAs1aVLZ7 DWx73lpYrSNJxiU7PrPihfS/Doy3VfmfF/RbH/xmkuPvsyrVfd16pEEtHGi5hBk2KQyjVqi1 IWwXV9ZVOQFBE9nJ7i6A7Aw3EwARAQABwsF8BBgBCAAmFiEEqbvj98Urq1e7HVyTkTTbS08t aqoFAmFCWtICGwwFCQeGHy0ACgkQkTTbS08taqrpIBAAjc6GdUjCyVsZLYwV8bMM4loltFrx z/mroCIFW4PZ0u4zENaloQbHuhDx7Ii6mR9jRiVNbXP4XvuyhjlUO+pt6hGrPbzsmV9vGvN0 2nkGYmSpxQNEzHQf/CJyLhPWY5qTJlDEr4zHbloG2KRPQ6dv9mdRIyAwDxNDSq2tVlrJC+b4 hG9vYp9msCZspqVDRTzvRTZQoWAvGJUaUgZd/FLPTfFePAmX+enXkUKl332i82xNU/nTix73 WajK7WhWC2GugrEbi42fJgUKRtYWhY36QyxucB1VWUacn7iKt/eLfPrCVVsHP2j4vqjlL/HJ 38TvbqfI4WbXyXF630U7IOlMT8//vpo3Y8hjWw0p5dm22fyPcjfnqxDdDefKCJpN215JgvDi Ww42J+VDTsd+5FJYCSUqg3jXmJl1z6FewF5hjuUGf/VdKCrhFocfh1b8VFgne2M1vyNcPoS8 23lJOMpcVAmzFhmVl5y/az/kgPJzbQggSByv3pZZUlJttLKf9BSGwmKcoGEgNo8p/DUyMkQV kVCJdmnamJzYEa/s3XRasTZhoWzNSjIEfeJaLd8dVXTzByMzgYuj/raFP1UF33GQ8W+zr23b VLVc8pEjMQlWeRGfJRyvG4ZOYpFk0c7jw8LpERCd/1SGHL3RQ3CwOqouQgKV+0BjMbY6A6Vj CuWio7k=
In-Reply-To: <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------8AsbXD1u0m0g9muLb8gC2OmJ"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/B95JHsreP6qQrcJgEIBmbhE15Ek>
X-Mailman-Approved-At: Wed, 20 Mar 2024 16:15:09 -0700
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2024 15:22:53 -0000

Hey Stig,
      Unfortunately, I will not be able to join the meeting as I will be 
on an airplane...

      I think you should note on slide 3 what the impact of each 
approach would have on advancing the spec to Internet Standard. To do 
that correctly, I think you have to break the last recommendation into 
two (add a recommendation, mandate a change).

      Personally, it seems like most of the scenarios posited have been 
related to old kit or mis-configuration. We can't standardize away those 
types of actions. At best, I think we can add recommended default 
settings for the compatibility mode variables referenced in section 7.

Regards,
Brian

On 3/19/24 8:34 PM, Stig Venaas wrote:
> Hi all
> 
> We have an agenda slot to discuss this here in Brisbane. Please join,
> in person or remotely to help us make the right decision.
> 
> You can see my proposed slides here
> https://datatracker.ietf.org/meeting/119/materials/slides-119-pim-rfc3376bis-v2-querier-fallback-issue-00
> 
> Let me know if you think this is inaccurate in any way or if there are
> important points we need to add. I know myself and others have
> different thoughts on this, it was hard resisting putting my own
> opinions in the slides. I plan to raise them as a participant at the
> meeting. Hope many of you can take part in the meeting as well.
> 
> Anyone from mboned seeing this, you are of course welcome to join as well.
> 
> Brian, are you able to join?
> 
> Thanks,
> Stig
> 
> On Tue, Jan 2, 2024 at 5:39 AM Brian Haberman <brian@innovationslab.net> wrote:
>>
>> Lenny's assessment is correct from my perspective. Section 7.3.2
>> specifies that IGMP version compatibility is kept on a per-group basis.
>> This should preclude compliant routers from disabling SSM service in the
>> SSM address range.
>>
>> Section 7.3.1 discusses the compatibility mode configuration option for
>> IGMPv3 routers, but there is not a recommended default setting for that
>> option.
>>
>> Are there aspects of RFC 4604 that people think need to be updated?
>>
>> Regards,
>> Brian
>>
>> On 12/19/23 4:09 PM, Leonard Giuliano wrote:
>>>
>>> As I understand, RFC4604 explicitly prevents SSM service from being killed
>>> by the presence of an IGMPv1/2 host (assuming the router is SSM aware,
>>> which in 2023 is a fairly valid assumption).  That is bc the router should
>>> ignore any v1/v2 reports in the ssm range (232/8).  And as I understand,
>>> RFC3376 Sect 7.3.2 provides backwards compatibility for v1/2 hosts, but
>>> only on a *per-group* basis- not for the whole LAN.
>>>
>>> Combining the two, SSM service is protected in SSM range (232/8).  In
>>> non-SSM range, due to backward compat, you could lose SSM behavior- but
>>> since you are in non-SSM range, all bets were off in the first place.
>>>
>>> So unless I'm missing something, I don't see see the risk of SSM being
>>> killed by v3 backwards compatibility.  Adding DKatz, who know this stuff
>>> way better than me in case I misinterpreted any of these specs.
>>>
>>>
>>> -Lenny
>>>
>>> On Mon, 18 Dec 2023, Holland, Jake wrote:
>>>
>>> |
>>> | On 12/14/23, 1:29 PM, "pim on behalf of Toerless Eckert" <pim-bounces@ietf.org <mailto:pim-bounces@ietf.org> on behalf of tte@cs.fau.de <mailto:tte@cs.fau.de>> wrote:
>>> | > The elephant IMHO is that rfc3376bis is so far not including changes to IGMPv3 behaviors
>>> | > about backeward compatibility with v1/v2 routers on the LAN, and exactly this behavior is
>>> | > killing SSM in deployment because any such router when it becomes querier will kill SSM
>>> | > ... because hosts will revert to v1/v2 and not report their SSM (S,G) memberships.
>>> |
>>> | +1, this is a serious problem.  The current default behavior bakes a DOS for SSM into the
>>> | protocol.
>>> |
>>> | > If there are routers that have config options to disable this backward compatibility with
>>> | > older routers, i would love to learn about it.
>>> |
>>> | When using linux routing there is `sysctl net.ipv4.force_igmp_version=3`, but it says because
>>> | of the difference in the security considerations between MLD and IGMP it doesn't actually
>>> | ignore v1 and v2 even when it's set:
>>> | https://urldefense.com/v3/__https://sysctl-explorer.net/net/ipv4/force_igmp_version/__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZENUoioNQ$
>>> |
>>> | (MLD permits an "ignore v1 completely" setting, but says it should only be used when
>>> | source filtering is critical:
>>> | https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc3810*section-10.2__;Iw!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZEHCk8UTw$  )
>>> |
>>> | > - Replace with something like:
>>> | >
>>> | > This revision of IGMPv3 version 3 removes automatic fallback to IGMP version 2 and version 1
>>> | > routers on the same network as specified in [RFC3376]. Instead,
>>> | > such older version router behavior MUST be explicitly configured.
>>> |
>>> | While I agree that to the greatest extent we can induce, IGMPv3 queriers from now
>>> | on should maintain the capability to propagate SSM and accept IGMPv3 membership
>>> | reports under all circumstances (even when there is an IGMPv1 or v2 receiver on the
>>> | LAN), I'm not sure it makes sense to ship text that makes all the currently deployed
>>> | routers retroactively non-compliant with a MUST in the new IGMPv3.
>>> |
>>> | But I'd support adding a section that describes the problem and provides a well-
>>> | justified and strong recommendation that the default behavior be changed from
>>> | what's in RFC 3376 and that a config option be provided to ignore IGMPv1 and v2
>>> | packets, like with MLD.
>>> |
>>> | It might be worth saying something like now that we have RFC 8815 and in light of
>>> | the experimental status of RFC 3618 (MSDP) and its deployment BCP in 4611, source
>>> | filtering should always be considered critical for clients that support it?  (Not sure that's
>>> | necessary, just a brainstorming idea to point to some of the docs that cover new
>>> | operational experience since 3376...)
>>> |
>>> | > IGMPv3 routers MUST have a configuration option, disabled by default, to operate
>>> | > as an IGMPv2 router. When enabled, all procedures of [RFC2236] apply. Configuring this
>>> | > option is necessary in the presence of non-IGMPv3 capable IGMP snooping switches or
>>> | > PIM routers. These are rare but may still be depoyed.
>>> | >
>>> | > When operating in IGMP version 3, routers MUST ignore version 1 and version 2 queries.
>>> | > In version 3, the presence of those older version queries constitutes a misconfiguration
>>> | > or attack, and these messages SHOULD result in logging of an error (rate-limited).
>>> | >
>>> | > - And in an appropriate part of the host behavior:
>>> | >
>>> | > IGMP version 3 hosts MUST have a configuration option, disabled by default, to ignore
>>> | > IGMP version 1 and version 2 queries. This option SHOULD be auto-enabled when the host
>>> | > is running SSM receiver applications, and hence depends on IGMP version 3 to operate in the
>>> | > network.
>>> | >
>>> | > This is about as much as i think we can do if we still want to go full standard with rfc3376bis.
>>> | > I can think of no operational deployment where the introduction of devices with existing
>>> | > older RFC compatibility would cause interoperability issues. At worst the new router would
>>> | > need to be explicitly configured for IGMPv2, which in my experience most routers deployed
>>> | > into IGMPv3 environments are done anyhow.
>>> | >
>>> | > Comments welcome. Would love to see positive replies in which case i will be happy to explicitly
>>> | > sugest the text changes for this elephant issue to the draft.
>>> |
>>> | Thanks for raising this, Toerless, the IGMP downgrade problem has been a major source of pain
>>> | for some deployments that rely on SSM.
>>> |
>>> | - Jake
>>> |
>>> |
>>> | _______________________________________________
>>> | MBONED mailing list
>>> | MBONED@ietf.org
>>> | https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZG9c7AK9g$
>>> |