Re: [spring] 6MAN WGLC: draft-ietf-6man-sids
Robert Raszuk <robert@raszuk.net> Sun, 09 October 2022 16:15 UTC
Return-Path: <robert@raszuk.net>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80643C1522A3 for <spring@ietfa.amsl.com>; Sun, 9 Oct 2022 09:15:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BgEYBq59eJNI for <spring@ietfa.amsl.com>; Sun, 9 Oct 2022 09:15:07 -0700 (PDT)
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25363C14F749 for <spring@ietf.org>; Sun, 9 Oct 2022 09:15:06 -0700 (PDT)
Received: by mail-wm1-x336.google.com with SMTP id l8so5563388wmi.2 for <spring@ietf.org>; Sun, 09 Oct 2022 09:15:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=cSHnIzHcUxV2jUiROKMHHkDVFVYjrihEU/bmfn/3GTc=; b=Ws7hR/tJZ7uvMrFFXo9zxfR+Soac/yYxchrRqwrv7o6ZNo9sId/DYhWO7s6vWvgyU/ kBwyHwF+HKzIOj8ry9T92QzRvw1ZHz1Kutk5Z4CIQjjgJw5OtUE2KoJAdr2hhnigf5vf AiT0yU2IQ0M45E1HcQZ07JFrtCtmT5HTr0V5FVi2b5+kdf0B5LD5rp7LBy4QTjqMZI/u APMHhUsVZpHmEFjU8FHof27Fh6NSOIAz023DwVR5wd3+5uolLL8O9SswPYkoy9GeMdbm DcNffgGphcbWvg4VHHipJiy5j7Pw6hT+dqZd073J3e4aKNjn8bqsvqeHwY/QYziSa01U ubBw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=cSHnIzHcUxV2jUiROKMHHkDVFVYjrihEU/bmfn/3GTc=; b=a2xcZAX5Lh9C91IcSqupXPqMVxPRKQoDKbQLrfnlckt90iZpOZhTwwuwrbpWIlLA4N II7xrHpX1P1Iwk+bZCeXx27747jMl4crejm+V/moJNa4axqdxnNmF/NoY99ODym5Pbn5 BCXm6NV0wv7tgSClIaamdzB9lPdyIedjAoYN12aw/l7fXFitsJYqjHB2TeiEHmnkZgrW +JNinndsvZ3K2I1PoIc8cnsooEu70ehLHebnY45vwnGgeqZGDnFclRIYxdkWWMUMihXr VmDPfz5cSOIF48VVQlCIA/Xbl2rjppD+5Y6eRaEbGw8SwzRTGjOn/TOWrcfDIK4Iq+lD F+iw==
X-Gm-Message-State: ACrzQf0qEWzvPHj1yPJA/gM+HS/xpZlPpptjhtaDWM5g+wg+BHFMd3CL IBwodsj8v4rY7hPnrkpqt3am9zYv0ALE2BYvEDljoA==
X-Google-Smtp-Source: AMsMyM4v2BXvVNuv++hPQqIWRNgeVqS27dhyUJvVezM6ZLtflm55jWMtvb/iCb/cTacQEjzqb+BKSI+kQ/d9wgyr84g=
X-Received: by 2002:a05:600c:3844:b0:3b4:becc:e43 with SMTP id s4-20020a05600c384400b003b4becc0e43mr17069868wmr.33.1665332104555; Sun, 09 Oct 2022 09:15:04 -0700 (PDT)
MIME-Version: 1.0
References: <CAFU7BARixwPZTrNQOuEw3WP-FqUsVwTj7btMTahcMbXm_NqWGw@mail.gmail.com> <CAB75xn4+N31=ggO03AAQJANv7RgHaC1eNGXRUQ9B20rLK+nJyg@mail.gmail.com> <E77D8982-11E9-45F9-81BF-3CA1E1F6B745@gmail.com> <CAB75xn4Zme4KOjPuY1_-4jCKTk1jshbq8X645zXhYQLiKB+N9g@mail.gmail.com> <54A38015-95AD-41F0-8E9D-76B3E62AA55B@gmail.com> <bdd7bf12-f712-3fe5-2698-9272c16ddded@joelhalpern.com> <58E77509-A1A1-4CE8-9EE4-22BEEEA8B62E@gmail.com> <98a941e4-0fff-ced1-d4ca-4406368eac31@joelhalpern.com> <4DC495DF-AD6B-4D60-80C4-B836DD365A0C@gmail.com> <CAOj+MMEx7+jWN1yC=81dMwo5GmqbhyHqOZr9W2_qzN9BNjs+Zw@mail.gmail.com> <ab55e9c0-60b9-2986-07f1-38c28852009e@joelhalpern.com> <CAOj+MMEn6Dz-Rz0PRRvR8VXT8idAQm+rLuouWJoNz-dA+kRkJQ@mail.gmail.com> <1fe2d387-8ecc-5240-092c-84a5978af5e4@gmail.com> <CAOj+MME6Nb3MLQCiGQ5S06Cwj6d3Z+aoSpxwFdtoFaV-yPPuJQ@mail.gmail.com> <e65772a1-bc86-c59c-e99f-7cabf92f28a4@joelhalpern.com> <CAOj+MMF-dWpdLwQjc611Uv6s_0jaexvvRNmiMbkqxwjAfqwHbw@mail.gmail.com> <e894c1bd-1474-f732-9d39-50e9d48e1d6d@joelhalpern.com> <CAOj+MME8Ca=ANegECKvDeDH22zwZxL5OQKjrvWVg42OZNaMrXQ@mail.gmail.com> <EF93A54E-0DB4-48F9-B210-15FE3AF82B0F@gmail.com>
In-Reply-To: <EF93A54E-0DB4-48F9-B210-15FE3AF82B0F@gmail.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Sun, 09 Oct 2022 18:15:43 +0200
Message-ID: <CAOj+MMEqyWaLq=D0SLPeGhRzFYi6w0p53UdqKxSgaxqJwDPvmw@mail.gmail.com>
To: Suresh Krishnan <suresh.krishnan@gmail.com>
Cc: 6man <ipv6@ietf.org>, SPRING WG List <spring@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008685e105ea9c5891"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/jX_KXUyyqq7K_lKlzflu0bnGTdI>
Subject: Re: [spring] 6MAN WGLC: draft-ietf-6man-sids
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Oct 2022 16:15:11 -0000
Hi Suresh, > One thing that is for certain is that this draft (draft-ietf-6man-sids) does not specify any > restrictions or provide any recommendations on filtering if this allocated prefix is not used OK many thx for this clarification I was not clear on this hence comments made. In general I would consider such a block to be part of my infra and naturally do filter on ingress. However one point still remains unclear. What if a distributed domain interconnected over the Internet is using a mix of these new allocated prefixes within each site and publicly routable IPv6 addressing to jump between sites within SRH ? Then still blind filtering based on SRH presence would be a bad thing. Not sure if this could be reflected in the document with a bit more precision ... Cheers, R. On Sun, Oct 9, 2022 at 6:01 PM Suresh Krishnan <suresh.krishnan@gmail.com> wrote: > Hi Robert, > Thanks for your further clarifications on the topic. I think I do > understand your concern now based on your discussions with Joel and Brian. > If I understand it correctly, the concern exists whether or not someone is > using their own allocated address block or if they use the prefix allocated > in this draft (Please correct me if this is not right). One thing that is > for certain is that this draft (draft-ietf-6man-sids) does not specify any > restrictions or provide any recommendations on filtering if this allocated > prefix is not used, and that would be covered by what Section 5.1 of > RFC8754 states. > > The generic concern you mentioned is something that needs to be discussed > in the scope of the operational guidelines draft. I certainly do see this > as a polarizing topic between the transit operators who would carry SR > traffic and those who do not wish to do so and as you say below we can only > provide recommendations. > > Regards > Suresh > > On Oct 9, 2022, at 11:42 AM, Robert Raszuk <robert@raszuk.net> wrote: > > Joel, > > > You can't tell a packet validly from another piece of your domain from a > packet being > > sourced by an attacker and spoofing its source address. > > Please rest assured that it is way easier to filter unplanned actions > carried in SRH inserted by an attacker than to protect all end systems from > globally reachable IPv6 destinations. > > So the former is a "bad idea" and the latter great one ... very > interesting observation. > > Nevertheless it is great that all you can do is to write an operational > recommendation. What will be actually done in the production networks is > beyond your control. > > Cheers, > R. > > On Sun, Oct 9, 2022 at 5:26 PM Joel Halpern <jmh@joelhalpern.com> wrote: > >> It is accurate that transits that do not use SRH do not need to worry >> about SRH. And arguably, even those that do use SRH do not need to worry >> about SIDs not in their usage ranges. Getting that right is non-trivial, >> but... >> >> The point in this particular case is that connecting pieces of your >> domain in the clear over the Internet puts you at significant risk. You >> can't tell a packet validly from another piece of your domain from a packet >> being sourced by an attacker and spoofing its source address. So if you >> deploy the use case you have described, that causes you to object to other >> folks filtering SRH, you are doing something that the IETF has good reason >> to say is a bad idea. >> >> So folks who filter the SRH, even if you do not like it, are doing what >> we told them to do. SRv6 was approved only for limited domains. >> >> While you have said you do not like limited domains, and there is a lot >> of ambiguity and bending of rules around such things, it does seem >> appropraite and legitimate for us to write in restrictions based on that >> property that the RFCs require. >> >> Yours, >> >> Joel >> On 10/9/2022 10:49 AM, Robert Raszuk wrote: >> >> Joel, >> >> > it turns SRH into a powerful attack vector >> >> Really ? >> >> How is this possible if IPv6 destination address of the packet does not >> belong to the block of locally allocated range used as ASN's infra subnet ? >> I am talking about a pure IPv6 transit case. >> >> Isn't this the case that SRH should be examined by the node listed in the >> destination address of the packet ? >> >> And of course it is common and very good practice to filter any external >> attempt to reach my own address blocks use for management and node >> configuration. But this is way more granular then to say kill all packets >> entering my network which have SRH. >> >> Thx, >> R. >> >> On Sun, Oct 9, 2022 at 4:37 PM Joel Halpern <jmh@joelhalpern.com> wrote: >> >>> We require, per the RFC, blocking SRH outside of the limited domain for >>> many reasons. >>> >>> One example is that it turns SRH into a powerful attack vector, given >>> that source address spoofing means there is little way to tell whether an >>> unencapsulated packet actually came from another piece of the same domain. >>> >>> So yes, I think making this restriction clear in this RFC is important >>> and useful. >>> >>> Yours, >>> >>> Joel >>> On 10/8/2022 5:07 PM, Robert Raszuk wrote: >>> >>> Hi Brian, >>> >>> Completely agree. >>> >>> One thing is not to guarantee anything in respect to forwarding IPv6 >>> packets with SRH (or any other extension header) and the other thing is to >>> on purpose recommending killing it at interdomain boundary as some sort of >>> evil. >>> >>> Cheers, >>> R. >>> >>> >>> >>> On Sat, Oct 8, 2022 at 9:51 PM Brian E Carpenter < >>> brian.e.carpenter@gmail.com> wrote: >>> >>>> Robert, >>>> >>>> > If there is any spec which mandates that someone will drop my IPv6 >>>> packets only because they contain SRH in the IPv6 header I consider this an >>>> evil and unjustified action. >>>> >>>> The Internet is more or less opaque to most extension headers, >>>> especially to recently defined ones, so I don't hold out much hope for SRH >>>> outside SR domains. >>>> >>>> https://www.rfc-editor.org/rfc/rfc9098.html >>>> https://datatracker.ietf.org/doc/html/draft-elkins-v6ops-eh-deepdive-fw >>>> >>>> Regards >>>> Brian Carpenter >>>> >>>> On 09-Oct-22 07:52, Robert Raszuk wrote: >>>> > Hi Joel, >>>> > >>>> > I was hoping this is apparent so let me restate that I do not buy >>>> into "limited domain" business for SRv6. >>>> > >>>> > I have N sites connected over v6 Internet. I want to send IPv6 >>>> packets between my "distributed globally limited domain" without yet one >>>> more encap. >>>> > >>>> > If there is any spec which mandates that someone will drop my IPv6 >>>> packets only because they contain SRH in the IPv6 header I consider this an >>>> evil and unjustified action. >>>> > >>>> > Kind regards, >>>> > Robert >>>> > >>>> > On Sat, Oct 8, 2022 at 7:40 PM Joel Halpern <jmh@joelhalpern.com >>>> <mailto:jmh@joelhalpern.com>> wrote: >>>> > >>>> > Robert, I am having trouble understanding your email. >>>> > >>>> > 1) A Domain would only filter the allocated SIDs plus what it >>>> chooses to use for SRv6. >>>> > >>>> > 2) Whatever it a domain filters should be irrelevant to any other >>>> domain, since by definition SRv6 is for use only within a limited domain. >>>> So as far as I can see there is no way a domain can apply incorrect >>>> filtering. >>>> > >>>> > Yours, >>>> > >>>> > Joel >>>> > >>>> > On 10/8/2022 3:16 AM, Robert Raszuk wrote: >>>> >> Hi Suresh, >>>> >> >>>> >> NEW: >>>> >> In case the deployments do not use this allocated prefix >>>> additional care needs to be exercised at network ingress and egress points >>>> so that SRv6 packets do not leak out of SR domains and they do not >>>> accidentally enter SR unaware domains. >>>> >> >>>> >> >>>> >> IMO this is too broad. I would say that such ingress filtering >>>> could/should happen only if dst or locator is within locally >>>> configured/allocated prefixes. Otherwise it is pure IPv6 transit and I see >>>> no harm not to allow it. >>>> >> >>>> >> Similarly as stated in Section 5.1 of RFC8754 packets >>>> entering an SR domain from the outside need to be configured to filter out >>>> the selected prefix if it is different from the prefix allocated here. >>>> >> >>>> >> >>>> >> Again the way I read it this kills pure IPv6 transit for SRv6 >>>> packets. Why ? >>>> >> >>>> >> (Well I know the answer to "why" from our endless discussions >>>> about SRv6 itself and network programming however I still see no need to >>>> mandate in any spec to treat SRv6 packets as unwanted/forbidden for pure >>>> IPv6 transit.) >>>> >> >>>> >> Thx, >>>> >> R. >>>> > >>>> > >>>> > -------------------------------------------------------------------- >>>> > IETF IPv6 working group mailing list >>>> > ipv6@ietf.org >>>> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >>>> > -------------------------------------------------------------------- >>>> >>> -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- > > >
- [spring] 6MAN WGLC: draft-ietf-6man-sids Jen Linkova
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Acee Lindem (acee)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Adrian Farrel
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Adrian Farrel
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Acee Lindem (acee)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Adrian Farrel
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Michael Richardson
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Xiejingrong (Jingrong)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Gyan Mishra
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Mark Smith
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Chengli
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Chongfeng Xie
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Fred Baker
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Mark Smith
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dhruv Dhody
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Nick Buraglio
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Vasilenko Eduard
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dhruv Dhody
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Xiejingrong (Jingrong)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Nick Buraglio
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dale W. Carder
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Nick Buraglio
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dhruv Dhody
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Chongfeng Xie
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Chengli
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Eric Vyncke (evyncke)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Eric Vyncke (evyncke)
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Ole Troan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids David Farmer
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids David Farmer
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dirk Steinberg
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Robert Raszuk
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Brian E Carpenter
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Dirk Steinberg
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Eduard Metz
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Joel Halpern
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Suresh Krishnan
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Eduard Metz
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Nick Buraglio
- Re: [spring] 6MAN WGLC: draft-ietf-6man-sids Erik Kline