Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Mon, 24 February 2020 17:31 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D909A3A0F23 for <rtgwg@ietfa.amsl.com>; Mon, 24 Feb 2020 09:31:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.491
X-Spam-Level:
X-Spam-Status: No, score=-1.491 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, PDS_BTC_ID=0.499, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ecitele.com header.b=VbwU5Sbt; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com header.b=dU5B16Ax
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f6XmznQ1kRIC for <rtgwg@ietfa.amsl.com>; Mon, 24 Feb 2020 09:31:18 -0800 (PST)
Received: from mail1.bemta26.messagelabs.com (mail1.bemta26.messagelabs.com [85.158.142.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34B393A0F25 for <rtgwg@ietf.org>; Mon, 24 Feb 2020 09:31:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ecitele.com; s=eciselector10072019; t=1582565476; i=@ecitele.com; bh=yG/tgvesp8zZAEmC3ujOgMZyKn11WOWqsQXmn5fN8T8=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=VbwU5Sbt2RgOghMiYMINtk3Y5PSdQw4S+YNXylO6/B909WhEw8FRg/BsFsUL+cDYX oUcJtibPpb09VlI5AC1xZNTUTv+CCvTKFNyZaIGIlBJWnHxqfn9vRKKWAKIVUIe+AG YiVVW9y8yjLYKAzgaZ0UbgICmKtbx5IL5EKKzAew=
Received: from [100.113.4.251] (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256 bits)) by server-1.bemta.az-b.eu-central-1.aws.symcld.net id DD/01-62111-368045E5; Mon, 24 Feb 2020 17:31:15 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrKJsWRWlGSWpSXmKPExsUi9LZno24SR0i cwa92a4tv056yWlxYPYXZ4sKb38wWHdP6WB1YPE4su8LqsXmdm8fOWXfZPZYs+ckUwBLFmpmX lF+RwJoxtT234NQfxorLP6obGHvvMHYxcnEwCixllvj18R0zhHOMRWL202tQzmZGiRPHJ7F3M XJysAisZZboOVAPkhASmMwkMbH/OBtIQkjgIaPEhFZhEJtNwFZi0+q7YHERAXWJzm3H2UEamA UaGCVernwDlODgEBZwlJhxNA2ixkni+OfD7BC2m8SS3jtsEMtUJVrWvmICsXkFEiX67k1hhli 8hkmicVczWIJTIEhi1fUfYA2MAmIS30+tAYszC4hL3HoyH8yWEBCQWLLnPDOELSrx8vE/Voj6 JIn7TxcygtwjIaAg8XebM0SJrMSl+d1QYWWJLS9iIcK+Et2rb7JD2DoSD36+ZYSwCyS2HN/LB mGrSbRfWAVVIyOx7dVacPBKCOxhkdh8eRo0rJIlTsz5zAJRJCexqvchywRGg1lIroaw8yRW9c 9lmwX2vqDEyZlPWCDi+hJ7Jp6CsrUlli18zQxh60nc2/GXFVl8ASP7KkaLpKLM9IyS3MTMHF1 DAwNdQ0NjXVNdEwO9xCrdJL3UUt3k1LySokSgpF5iebFecWVuck6KXl5qySZGYHpLKWTV2MF4 Yvl7vUOMkhxMSqK8XJuC44T4kvJTKjMSizPii0pzUosPMcpwcChJ8B5jDYkTEixKTU+tSMvMA aZamLQEB4+SCO9kJqA0b3FBYm5xZjpE6hSjPceEl3MXMXO8+7kYSH5ctQRIfgeRQix5+XmpUu K8ymxAbQIgbRmleXBDYbnhEqOslDAvIwMDgxBPQWpRbmYJqvwrRnEORiVh3miQKTyZeSVwu18 BncUEdNbqP8EgZ5UkIqSkGpiUXyy/N+f0zSVPU07933P9aOkM8e6Dhz/v9WIV3dDR0Fr3fn76 4fvxs3lypISeLNMxnf1zbpZU0/xkC+a61+cPPjt1IlVz2oTnHkJX44+kf/styvlzEadKkYb21 w2/yte1Ta/tt4lQv+8Ue18hRSnW6f/eSNGb9kv1i613dn6tkH68dV5DUJhnicafXUVq++4+N/ wsZtVTzDDZxH3h/ZhZx3sdZ6kbXXqfevVeV67O+hXndp6wcAwUatX8znn+CNMUHVsWHlOpKZU TzL8u41NOqFI08+A4LrXs826ns/qtNqb73PwbvSdXfNfxXT53z7+VFec3/AyYuIm1yOjjVvGl 19m1V/sdlVHUde3/eU9TiaU4I9FQi7moOBEAJXPH9YgEAAA=
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-3.tower-245.messagelabs.com!1582565472!380079!1
X-Originating-IP: [18.237.140.177]
X-SYMC-ESS-Client-Auth: mailfrom-relay-check=pass
X-StarScan-Received:
X-StarScan-Version: 9.44.25; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 9084 invoked from network); 24 Feb 2020 17:31:14 -0000
Received: from p01b.mail.dlp.protect.symantec.com (HELO mail.ds.dlp.protect.symantec.com) (18.237.140.177) by server-3.tower-245.messagelabs.com with ECDHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 24 Feb 2020 17:31:14 -0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KEHbRArhw1rsK4l0mL+8AnCX0XA6ZQnDavh1FUpTAspBfg51h9A5BPZWqDQwJxKm01ebQuti3+gu2n//MSl5auRNznXUVgadVbE94tDxuDRL6Oawo+KNvQ1DExisugCvVpRe3NxAYhrikR0e0RAFT5PU6Q81gZ5Pdsa8AepvvOGFUXuNPMFwT7CtN5mNnv1XQgbvhPJHjTOCBpEpxQ2hLCOidJKmuNaVlVvmWe4UFfabLN7ry4l5MuG3FbaANWQO3YtYQGgfwEGZUZVXvG8b6M1vUI/uhLT8sPii0QOceTIS91TYut20p/WcVNsYYI0WLPiiu7XePUkp7zScEZYHQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eAJENZqtKgs0eOpxG73HnpXPk8Bm18fbz5DpPcC8QPo=; b=EQXlzGzv0/Jf+XWL5L2GU1KayI5c8qNjGy7IqJ1wnn5D7MIjhByjyi0mccptMYTk7SvqdOAGVIYhhJKbxUUCSTx7wJpRgZrk4f657nylZMN9/e+aPZdVpgSZBnC48mCxUp0sG7/bQm2TBbnI9scapsYnq6u2d6OS202+r13PexO2E31IyU1qhVvrPBzniCvutSxziqIOsbT4EzINYSUbpokC4LmqQMRNJ9F7ontffIhl2yCiYKAW8V5AM4SbITNTTc2wOuAvk/GTnQIB/uhghOW1/7UKuckcYltaKR7Kes6CN18hWKnfmBZi1UPUxTXMwT+n32B2Zl5zVnbvh/hjxA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ecitele.com; dmarc=pass action=none header.from=ecitele.com; dkim=pass header.d=ecitele.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector2-ECI365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eAJENZqtKgs0eOpxG73HnpXPk8Bm18fbz5DpPcC8QPo=; b=dU5B16AxExq/1vVP3a6HAHex6wW7bk/4VFaj5U51JGUtVWXIpDX8vUjUODaZ+4ROzNKv9B+xGMRfUr/GK7iDTRhvWDGPblvPYMAcug//gO5uBbdr2CEI5vYpSM4tsgs9hwnw4vjrRJSeVQFQJksduP0RaYALhR6nhKQTjHW/FPI=
Received: from AM0PR0302MB3217.eurprd03.prod.outlook.com (52.133.33.12) by AM0PR0302MB3361.eurprd03.prod.outlook.com (52.133.37.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Mon, 24 Feb 2020 17:31:09 +0000
Received: from AM0PR0302MB3217.eurprd03.prod.outlook.com ([fe80::aca8:db6e:97b:c780]) by AM0PR0302MB3217.eurprd03.prod.outlook.com ([fe80::aca8:db6e:97b:c780%7]) with mapi id 15.20.2750.021; Mon, 24 Feb 2020 17:31:09 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Yimin Shen <yshen=40juniper.net@dmarc.ietf.org>, Huaimo Chen <huaimo.chen@futurewei.com>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection
Thread-Topic: Mail regarding draft-hu-rtgwg-srv6-egress-protection
Thread-Index: AQHV6Tj/QTh4u6ex9kyPrxr+4lY6AKgnDNKAgAGQgwCAAfuBAIAAAOCU
Date: Mon, 24 Feb 2020 17:31:08 +0000
Message-ID: <AM0PR0302MB3217DC064CAF91ED63BA05C39DEC0@AM0PR0302MB3217.eurprd03.prod.outlook.com>
References: <BY5PR13MB3651E27C33405CA8D1BC4FF4F2EE0@BY5PR13MB3651.namprd13.prod.outlook.com> <15DAD938-D0E1-4BB0-BE20-40602495474A@juniper.net> <AM0PR0302MB3217801FFC00FB8D8B177E2A9DEF0@AM0PR0302MB3217.eurprd03.prod.outlook.com>, <CA+RyBmXP8ZNo0f7WM8U1UzNHDwBcbDTg4KaLqQH42gc9WouKZA@mail.gmail.com>
In-Reply-To: <CA+RyBmXP8ZNo0f7WM8U1UzNHDwBcbDTg4KaLqQH42gc9WouKZA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [79.182.99.98]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 125c1a12-c788-4053-645e-08d7b94f55e1
x-ms-traffictypediagnostic: AM0PR0302MB3361:
x-microsoft-antispam-prvs: <AM0PR0302MB33618E13585E220A6FC336229DEC0@AM0PR0302MB3361.eurprd03.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4303;
x-forefront-prvs: 032334F434
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(366004)(136003)(396003)(376002)(199004)(189003)(7696005)(26005)(6506007)(66946007)(33656002)(6916009)(2906002)(76116006)(316002)(54906003)(91956017)(66446008)(64756008)(66556008)(66476007)(71200400001)(186003)(966005)(8936002)(4326008)(86362001)(52536014)(66574012)(5660300002)(53546011)(45080400002)(81166006)(8676002)(478600001)(9686003)(81156014)(55016002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR0302MB3361; H:AM0PR0302MB3217.eurprd03.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ecitele.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 01EH6McbyKtHaUNLUSPl+Yp5BE6nANxtJvmVw5dPMA/GyRE0Z0Xs9n59SqzkoNwt4hefEt8bqsjAnVm3gsaBO3XSAM4UBw4Gso7C3RdtEZkBzdQIymXb5c+qtVaqxDYRi97atAPanqPHNUlrsJd/0g==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR0302MB3217DC064CAF91ED63BA05C39DEC0AM0PR0302MB3217_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 125c1a12-c788-4053-645e-08d7b94f55e1
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2020 17:31:08.7405 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Um4dWYVky+xhORaayfgOet8lImIbcKsxT4t+TV/mbRIZvNKTm8N6ckbmQatixLmFXwTnToctcPICpFQmtsR3mQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0302MB3361
X-CFilter-Loop: Reflected
X-DetectorID-Processed: d8d3a2b3-1594-4c39-92fb-b8312fe65a8a
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/WrZca3IAgT40jlACJkAEMdaMH6M>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 17:31:21 -0000

Greg and all,
My description of what happens at the PLR was just an attempt to combine a message by Zhibo Hu (in which he refers to a specific procedure in the SRv6 Network Programming draft and and the generic definition of this procedure. It is still not clear to me whether this procedure equally applies to the "regular Binding SID" (bound to an SR-TE Policy) and to the Mirror SID.

My concerns are based on the following analogy (which may be relevant or not):

In SR-MPLS, handling of the active Binding SID that is bound to an SR-TE Policy simply means swap of the top label with a new label stack as defined in RFC 3031. But handling of a Mirror SID means that it is treated as the context kabel so that tge next label is looked up in the context label space it identifies as defined in RFC 5331; there is no way to handle it correctly if your MPLS DP only supports the primitives defined in RFC 3031.

I am not sure that similar behavior has ever been defined for the IPv6 DP -even augmented by the definition of the SRH.

My 2c.


Modification of the SRH by the PLR is in direct contradiction with RFC 8200.



Get Outlook for Android<https://aka.ms/ghei36>

________________________________
From: Greg Mirsky <gregimirsky@gmail.com>
Sent: Monday, February 24, 2020, 19:13
To: Alexander Vainshtein
Cc: Yimin Shen; Huaimo Chen; rtgwg@ietf.org
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection

Hi Sasha,
thank you for bringing the procedure a PLR to the discussion and providing your understanding of the procedure at PLR:
a.       Push a new IPv6 header and a new SRH on the original packet.
                                                               i.      The new SRH would include the Node SID of the Protector node and the Mirror SID
                                                             ii.      The destination IPv6 address would be the address of the Protector node
                                                           iii.      The Next Header value in the SRH would be IPv6
b.       Decrement the TTL in the inner IPv6 header
c.       Forward the packet towards the Protector node.
is very much different from the text in the draft:
P1 modifies the packet before
sending it to PE4.  The modified packet has destination PE4 with
mirror SID A4:1::3, and SRH with PE3's VPN SID A3:1::B100 and the
mirror SID A4:1::3 (i.e., "A3:1::B100, A4:1::3; SL=1").
The former text describes what can be characterized as bypass tunneling, while the latter is not. And I'm very much concerned that the procedure, as described in the draft, breaks immutability of SRH and thus violates RFC 8200.
I'm looking forward to hearing from the authors how PLR procedure really works - as described by you or as documented in the text.
That said, I do not support the adoption of the draft at this point.

Regards,
Greg

On Sun, Feb 23, 2020 at 4:01 AM Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:

Dear all,

I concur with Yimin's comments in his last email.



I have also an additional concern regarding support of a Mirror SID in SRv6. This concern is based on the following observations:

1.       As per RFC 8402, a Mirror SID is a special case of the Binding SID

2.       In SR-MPLS, a Mirror SID is defined as a generalization of the Context label  as defined RFC 5331. If it is not the last label in the label stack, then, to the best of my understanding, it is just the Context label identifying the context label space in which the next label (representing the next SID in the list) is looked up. in other words, ability of SR-MPLS to support Mirror SID is based on support of context labels and context label spaces in the MPLS DP. IMHO and FWIW it would not work with the MPLS DP as defined in RFC 3031 and 3032.

3.       As mentioned in the email by Zhibo Hu<https://clicktime.symantec.com/32XmKo6nSvFvDEanEXdou986H2?u=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Frtgwg%2FJ2fJ3PF-bIYIeRzeWG83QpqpAR4%2F>, “The behavior of PLR encapsulating Mirror Sid is the same as that of SRv6 Ti-LFA。draft-ietf-spring-srv6-network-programming section 5.1 has been mentioned that H.Encap is used to encapsulate the TiLFA Repair List”.  I assume that this what the draft in question intends to do, i.e.,:

a.       Push a new IPv6 header and a new SRH on the original packet.

                                                               i.      The new SRH would include the Node SID of the Protector node and the Mirror SID

                                                             ii.      The destination IPv6 address would be the address of the Protector node

                                                           iii.      The Next Header value in the SRH would be IPv6

b.       Decrement the TTL in the inner IPv6 header

c.       Forward the packet towards the Protector node.

4.       This technique would work just fine in the case when the inserted SID refers to a topological instruction (as in the case of Ti-LFA or in the case when a binding SID represented an SR policy.  But I do not understand how it could be used with SIDs that are not topological instructions without any updates to IPv6 data plane.



My 2c,

Sasha



Office: +972-39266302

Cell:      +972-549266302

Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>



-----Original Message-----
From: rtgwg <rtgwg-bounces@ietf.org<mailto:rtgwg-bounces@ietf.org>> On Behalf Of Yimin Shen
Sent: Sunday, February 23, 2020 4:10 AM
To: Huaimo Chen <huaimo.chen@futurewei.com<mailto:huaimo.chen@futurewei.com>>; rtgwg@ietf.org<mailto:rtgwg@ietf.org>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection



Hi Huaimo, Authors,



>> Step 1:  Find the P-Space P(Z, X) and the Q-Space Q(Y, X), which are similar to those in [RFC7490];



Unfortunately this is not a right solution. As I mentioned before, in egress protection, bypass path computation should not rely on LFA, because it is not finding a path to merge back to the protected/primary router. I have already suggested in a previous email to remove the link between PE3 and PE4, to make your discussion more generic. Similarly, the draft should not assume there is a multi-hop path from PE4 to PE3 which does not traverse P1. Your  mechanism must be able to return a bypass path in these cases. My suggestion is to take the guidelines in RFC 8679, and use context-IDs as locators.



>>    Step 5:  Try to find a shortest path from Z to Y without going through X;



As a transit router, Z is supposed to perform generic bypass calculation for X (like other IPv6 addresses), based on a general FRR logic. So, how would Z even know to "Try" in this step ? What is it trying ? Isn't this "shortest path from Z to Y without going through X" the bypass path you are looking for in Step 1 - 3 ?



>>    For a (primary) locator associated with the (primary) egress node of a SR path/tunnel, most often the locator is routable.  This is the case we assumed,



Non-routable locator should be supported, and it can be supported. In this case, bypass path calculation should be based on BGP nexthop. Again, please refer to RFC 8679 regarding how to use context-ID as BGP nexthop for a solution.





Thanks,

-- Yimin





From: Huaimo Chen <huaimo.chen@futurewei.com<mailto:huaimo.chen@futurewei.com>>

Date: Friday, February 21, 2020 at 11:45 PM

To: Yimin Shen <yshen@juniper.net<mailto:yshen@juniper.net>>, "rtgwg@ietf.org<mailto:rtgwg@ietf.org>" <rtgwg@ietf.org<mailto:rtgwg@ietf.org>>

Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection



Hi Yimin,

    Thanks much for your comments.

    The procedure with details that a PLR uses to compute a backup path has been added into the draft, which has been uploaded.

Best Regards,

Huaimo

Hi Huaimo, authors,



>>> Node P1's pre-computed backup path for PE3 is from P1 to PE4 via P2.



I’m still concerned that there is no details in this draft about the procedures how a PLR computes a backup path to the protector, in both of the two cases below.



[1] the primary locator is routable.

[2] the primary locator is not routable.



Thanks,

-- Yimin







_______________________________________________

rtgwg mailing list

rtgwg@ietf.org<mailto:rtgwg@ietf.org>

https://clicktime.symantec.com/3F1LB8RvcSLpHAYLrEmGjgH6H2?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frtgwg

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________
_______________________________________________
rtgwg mailing list
rtgwg@ietf.org<mailto:rtgwg@ietf.org>
https://www.ietf.org/mailman/listinfo/rtgwg<https://clicktime.symantec.com/38fPqE2RREeDWfdbMWtDWR26H2?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frtgwg>


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________