Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]

David Farmer <farmer@umn.edu> Mon, 02 May 2022 03:50 UTC

Return-Path: <farmer@umn.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E193C15ED76 for <v6ops@ietfa.amsl.com>; Sun, 1 May 2022 20:50:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umn.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uOXPSxXqs7lI for <v6ops@ietfa.amsl.com>; Sun, 1 May 2022 20:50:22 -0700 (PDT)
Received: from mta-p7.oit.umn.edu (mta-p7.oit.umn.edu [134.84.196.207]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B5EAC157B41 for <v6ops@ietf.org>; Sun, 1 May 2022 20:50:21 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mta-p7.oit.umn.edu (Postfix) with ESMTP id 4Ks8Hw09VSz9vJrW for <v6ops@ietf.org>; Mon, 2 May 2022 03:50:20 +0000 (UTC)
X-Virus-Scanned: amavisd-new at umn.edu
Received: from mta-p7.oit.umn.edu ([127.0.0.1]) by localhost (mta-p7.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Se1yPxLq_zdO for <v6ops@ietf.org>; Sun, 1 May 2022 22:50:19 -0500 (CDT)
Received: from mail-ed1-f71.google.com (mail-ed1-f71.google.com [209.85.208.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p7.oit.umn.edu (Postfix) with ESMTPS id 4Ks8Hv1NjLz9vJrT for <v6ops@ietf.org>; Sun, 1 May 2022 22:50:18 -0500 (CDT)
DMARC-Filter: OpenDMARC Filter v1.3.2 mta-p7.oit.umn.edu 4Ks8Hv1NjLz9vJrT
DKIM-Filter: OpenDKIM Filter v2.11.0 mta-p7.oit.umn.edu 4Ks8Hv1NjLz9vJrT
Received: by mail-ed1-f71.google.com with SMTP id eg38-20020a05640228a600b00425d61d0302so8065800edb.17 for <v6ops@ietf.org>; Sun, 01 May 2022 20:50:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Vs74ZW7SCQriGvn/32cOIX2no9g6PFfRQ690a3cgJJQ=; b=joRN0GXXkGLGQRoIGsAAusHnpAOzZfBjEixFVE/8RXWeQ65WTfxjHi8e2z4FTphZhD Abos/KUuaSqzDJaTqtZEGX9rwOC8mxRptmNFdfNj3GSzDqL4txXo0kxIVpmYUqPPqn9u SKCNsEPs0sD8pPkMiHBbT98s8yjMAmmAfcOx9wISFA0hQypYcQ1uvL+X9Fx8+bUOPeSY xHYt8e8fqb73KddsKUAOXwmv2ouzbhMphPWW+ZdI95lMXDa6U13lXd5vAhLIJwz9IGL8 gsFuC++aaNexpd+xcMFWLDkVk0jnFauebnASsl0IW7OZ6gxf/sALq6zBCM6zIkVmtXu/ rCuA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Vs74ZW7SCQriGvn/32cOIX2no9g6PFfRQ690a3cgJJQ=; b=KwUf/dbpjDm9QX74rP1p/88SFzmMWtyGfOFcWLAGOzZ/SEE7K8Aouxt4j5YyLmvgq8 8oT+MMLNh12mQqxRDMRqRseshKfJURmvVyFpDBa1XYWXSKsSXlWhsONHHSV0kKHlsC49 aVTa5l9vdUlQmZD8MVTzWyto6NvE6x7/xbMbvDwQGkJnXcSUof2Be07d4DqWPVffpEQz DPrpCwl7RqRjBoR1RSrrQARX8Bo5mJrZgS44IBD24FIijJzoG4qJGRW6drU8KVWUToeW Ro1p8EBB0xDNgXj25DpjgWp7ju/hGbM59PdYmpYNyLtUu5TXiMtSnabsdbXEE05rPjNJ yIzg==
X-Gm-Message-State: AOAM5327E7UhGy/VXUfogVgPyo3ak2WCLX2s8quaCTUmdLktSAZcjVb6 7PLdkC9c+GNVM+ObJpTgfNd1BGjDTV3jpiYqINWU+hT5vAY6BmsiOwD7sc7CzoS02cu3tneya8w p10vrf582/ie/O6f+7Pa1ROur1g==
X-Received: by 2002:a17:906:2989:b0:6f3:a215:8426 with SMTP id x9-20020a170906298900b006f3a2158426mr9735933eje.725.1651463417335; Sun, 01 May 2022 20:50:17 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJxGT/dgZfDN0j0P4BnCTm4qq2qWMCdKFYjeTLAo/qFxl8MnPuLcfKLYTxNRqUtmLgJXsLVnWCHgwqsaP9IGg7A=
X-Received: by 2002:a17:906:2989:b0:6f3:a215:8426 with SMTP id x9-20020a170906298900b006f3a2158426mr9735916eje.725.1651463416938; Sun, 01 May 2022 20:50:16 -0700 (PDT)
MIME-Version: 1.0
References: <CAM5+tA8WvjvWirxqE6kQ9LQAG0NcpWyCLGVooB=G7gZ9ETb2zQ@mail.gmail.com> <20220424172743.GA218999@fg-networking.de> <CAKD1Yr1v0Tkh+pWD-ts=PL3gZf7Qj6OHW6Cuvj8iGcSSMibjew@mail.gmail.com> <0afe25f5-52b7-a438-0696-cf8b0a83c2dc@gmail.com> <BN8PR07MB70760D9693580F5BDCB61DD995F89@BN8PR07MB7076.namprd07.prod.outlook.com> <CAKD1Yr3Z9wGQ+uiA2WcW00MrOiLyHs+bSoFjHVtrixCi2qp4DA@mail.gmail.com> <BN8PR07MB7076A6456CAB48EF428D6E8695F89@BN8PR07MB7076.namprd07.prod.outlook.com> <65d0d9ac-77fc-c200-09e3-0c3949ca1541@gmail.com> <CAN-Dau2FS99ewfgH8xk-jSJFCnO92CJV9ZC98DUE2UDR7V1Eww@mail.gmail.com> <CANMZLAYbpZBDA8uFnJqfWfWTQ4S9RN4a-DqWe36qzfAfDtXiQA@mail.gmail.com> <CAN-Dau0BjRR2_7xz38DpJsz0Y=Z_8bV5n-=Eh1QUVEDzqVxmaA@mail.gmail.com> <CAPt1N1=H=eAyRu0JcHnLpZEUizDZ4Kj0VwPu=0nM=Wn+y3Ho1w@mail.gmail.com> <CAM5+tA_4rtSkgEuRUFZ2LYr6i8a7vWeKODYieVARF3RbRvgRww@mail.gmail.com> <BN8PR07MB7076DE3E745CB916FB81879595FA9@BN8PR07MB7076.namprd07.prod.outlook.com> <ADAE42CE-448F-42F5-89BE-692F493E2DC8@consulintel.es> <CAM5+tA_ksJ+agY1tze1-zPHLsgYFgjEYtnuPs+ffZbnRqiHytw@mail.gmail.com> <BAD082DA-0958-4926-B3E5-4E4599A75078@consulintel.es> <BN8PR07MB7076564E50C0DAFBFAB950FD95FA9@BN8PR07MB7076.namprd07.prod.outlook.com> <CAPt1N1ncVkekecS=dBHSR3WtaEMruy55Udxy0WSMGTgbN24pKw@mail.gmail.com> <CAM5+tA8-Zqka-vZ9jRL3wn0dtfuJj0ECx_k9prwyS2ypisaPtw@mail.gmail.com> <FB031B76-7E88-4824-876F-D1A05F8D2215@thehobsons.co.uk> <CAFU7BAST-oNGpy4JvODDsf=8eS69hV8XCi8OgEHBkkoujRN3Rw@mail.gmail.com> <699f556a3eac41179a80d2cc8749a191@huawei.com> <CAO42Z2wiebCOPmtcEOJ3rOaZEpHE7qFZZTf5KLWybSsL6rOd9Q@mail.gmail.com> <CAN-Dau1FV-uEkX1S7vOEVxggjcNvUVTmokPAEOiapxPTySN-vw@mail.gmail.com> <CAPt1N1mk8Qv1anXohCJaiH0WWn-BkS4mr=ffyF0cCaE7CM314w@mail.gmail.com> <CAE=N4xf_wRPQeChkfXWxj7+Do8jp2U6hDtjH+-RUNis+ynMRbQ@mail.gmail.com> <CAM5+tA__Gegt5fR1UFwshm7DKDVMDpFsJK2jMG6Z6Yo79Noc3A@mail.gmail.com> <59b90d7184194a84a0c53b616796dec0@huawei.com> <BN8PR07MB70767C3EC7B68EF1D2286CFE95FC9@BN8PR07MB7076.namprd07.prod.outlook.com> <CAN-Dau3iyP7sMUsiP3ckYEpkLoQK-bpgKnDn6d4Ci7f9V_5CPw@mail.gmail.com> <14c97051cbeb4e20b4b1103c894cd602@huawei.com>
In-Reply-To: <14c97051cbeb4e20b4b1103c894cd602@huawei.com>
From: David Farmer <farmer@umn.edu>
Date: Sun, 01 May 2022 22:50:05 -0500
Message-ID: <CAN-Dau2s+MxdC1xc9xM=Gs2x5Ak9nh0uv-m5_nYGPHymZMUJsw@mail.gmail.com>
To: Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
Cc: 6man list <ipv6@ietf.org>, David Farmer <farmer=40umn.edu@dmarc.ietf.org>, Kevin Myers <kevin.myers@iparchitechs.com>, v6ops list <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000053a56905ddff4aa6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/0f-QKd9se7piEEWLUOiRs62AkWg>
Subject: Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 May 2022 03:50:28 -0000

You are correct, RFC 6724, section 10.6, doesn’t specifically mention IPv4.
However, if you do what it says in paragraph 3 of that section, the local
ULA /48 will have a precedence higher than IPv4(both GUA and RFC1918) and
IPv6 GUA.

I agree the draft should focus on the problem statement, however, I don’t
believe implementations that automatically add the local ULA /48, as
suggested in RFC 6724 section 10.6, paragraph 3, actually have the problem
we are taking about. Furthermore, if you manually add the ULA /48, you can
work around the problem, in the cases where it is possible to do so.
However, as noted in the draft, it is not always possible or practical to
modify the table manually. And, therefore, in many/most cases ULA doesn’t
function as intended.

Basically, I believe the solution it to make section 10.6, paragraph 3,
mandatory, a normative MUST, instead of the effective MAY that it is now.
Also, we should probably elaborate on how to automatically add the local
ULA /48, in particular how a network signals there are might be more than
one ULA /48 that should be considered as local.

I believe RFC 6724 is correct, ULAs that are not known to be local, should
be considered remote and GUA IPv6 and IPv4(both GUA and RFC 1918) should be
considered more reliable than any possibly/probably remote ULA prefix.
Where RFC 6724 failed, is not to require the known to be local ULAs to be
added to the table, so ULA will function as intended.

Thanks

On Sun, May 1, 2022 at 13:50 Vasilenko Eduard <vasilenko.eduard=
40huawei.com@dmarc.ietf.org> wrote:

> RFC 6724 section 10.6 does not discuss the primary problem: IPv4
> precedence over ULA. This section does not touch IPv4 at all.
>
> Hence, it is not a solution to the problem.
>
>
>
> Moreover, I believe that the default configuration should prefer ULA over
> IPv4.
>
> It is just a problem how to make sure that the ULA source would not
> connect GUA destination in the absence of NPT.
>
> Erik Auerswald proposal (to use Labels) is good but I have shown that in a
> corner case (not sync routers) it would fail because next-hop is chosen 1
> st that restricts PIOs choice.
>
> It is a big question how far WG would agree to change RFC 6724.
>
>
>
> draft-buraglio-v6ops-ula is just a problem statement. Hence, not dependent
> on the solution that would be difficult to find a consensus.
>
> Ed/
>
> *From:* David Farmer [mailto:farmer=40umn.edu@dmarc.ietf.org]
> *Sent:* Saturday, April 30, 2022 12:21 AM
> *To:* Kevin Myers <kevin.myers@iparchitechs.com>
> *Cc:* Vasilenko Eduard <vasilenko.eduard@huawei.com>; buraglio@es.net;
> v6ops list <v6ops@ietf.org>; 6man list <ipv6@ietf.org>
> *Subject:* Re: [v6ops] Vicious circle [ULA precedence [Thoughts about
> wider operational input]]
>
>
>
> I think this problem needs to be worked on, so I think this draft should
> be promoted to v6ops WG draft.
>
>
>
> As I see it, the problem is that many implementations prefer IPv4 local
> addresses over IPv6 (ULA) local addresses. This is because many
> implementations don't implement the suggestion in RFC6724, section 10.6,
> paragraph 3. Without RFC6724, section 10.6, paragraph 3, hosts prefer IPv4
> local addresses over IPv6 (ULA) local addresses, whether or not NAT44 is
> being used.
>
>
>
> Additionally, RFC6724 seems to have an unstated assumption that all
> devices need and want global connectivity to the Internet. This is probably
> the correct assumption for most general-purpose devices, like desktops,
> laptops, tablets, and even smartphones. However, many other devices, such
> as IoT or 6lowpan devices, and even printers, are intended only to
> communicate locally, or locally to an application-specific gateway, then to
> the cloud or the Internet through that gateway.
>
>
>
> I think maybe the answer is to require the implementation of RFC6724,
> section 10.6, paragraph 3, which is effectively a MAY currently and should
> be promoted to at least SHOULD, if not a MUST. Currently, implementations
> that don't add the local ULA /48 as described in RFC6724, section 10.6,
> paragraph 3, exhibit a default behavior that prefers an IPv4 local address
> over an IPv6 local address.
>
>
>
> Further, it might be worth making separate recommendations for devices
> that are intended for local-only communications, for these devices, it
> might be appropriate for ULA to be preferred over IPv4 and IPv6 GUA, only
> using GUA if ULA is unavailable.
>
>
>
> Thanks.
>
>
>
> On Fri, Apr 29, 2022 at 12:49 PM Kevin Myers <kevin.myers@iparchitechs.com>
> wrote:
>
> I agree, the problem is well defined and documented. It is impactful for
> real world ops and further work is valuable to a great number of orgs and
> operators worldwide.
>
> it should be promoted to v6ops WG draft.
>
>
>
> *From:* v6ops <v6ops-bounces@ietf.org> *On Behalf Of *Vasilenko Eduard
> *Sent:* Friday, April 29, 2022 11:22 AM
> *To:* buraglio@es.net
> *Cc:* v6ops list <v6ops@ietf.org>; 6man list <ipv6@ietf.org>
> *Subject:* Re: [v6ops] Vicious circle [ULA precedence [Thoughts about
> wider operational input]]
>
>
>
> IMHO: draft-buraglio-v6ops-ula should be promoted to v6ops WG draft.
>
> The problem is real and important.
>
> Ed/
>
> *From:* v6ops [mailto:v6ops-bounces@ietf.org <v6ops-bounces@ietf.org>] *On
> Behalf Of *Nick Buraglio
> *Sent:* Friday, April 29, 2022 6:09 PM
> *To:* Ed Horley <ed@hexabuild.io>
> *Cc:* David Farmer <farmer=40umn.edu@dmarc.ietf.org>; Xipengxiao <
> xipengxiao=40huawei.com@dmarc.ietf.org>; v6ops list <v6ops@ietf.org>;
> 6man list <ipv6@ietf.org>
> *Subject:* Re: [v6ops] Vicious circle [ULA precedence [Thoughts about
> wider operational input]]
>
>
>
>
>
> On Fri, Apr 29, 2022 at 10:00 AM Ed Horley <ed@hexabuild.io> wrote:
>
> To bring things back into focus. I believe the goal of the submitted
> informational draft was to identify the "Unintended Operational issues with
> ULA" (which is the title of the draft) so that it was clear what structural
> problems exist with ULA currently. It does not propose any fixes, I believe
> that would be a separate but important discussion (well, a yelling
> match apparently). I am specifically interested if anyone has any
> documented and verifiable configurations that either counter the points
> made, disprove the points made, or prove false the points made in the
> submitted draft. For those that have not read it yet you can find it here:
>
> https://datatracker-ietf-org.lucaspardue.com/doc/draft-buraglio-v6ops-ula/
>
> or
>
> https://www.ietf.org/id/draft-buraglio-v6ops-ula-01.html
>
>
>
> Once we agree on what the problem space is, I believe it makes it a bit
> easier to talk about what to actually fix, if anything. I believe that was
> the goal Nick had originally with this, but he can confirm that I imagine.
>
>
>
> Exactly this. The draft was intended to identify a gap, a problem space
> that we encounter fairly frequently in the work I am doing at the moment.
> It is *not* intended to condone address translation, to hasten NAT66, or to
> solutioneer anything. That part should come after we agree that there is in
> fact a problem space as defined in the draft.
>
>
>
> To bring this back to a very simple yes or no question, does anyone
> disagree with, or have recent experience that is counter to the draft?
>
> If the answer is that "yes, we have data that shows that this draft is
> incorrect", let's talk about that.
>
>
>
> nb
>
>
>
>
>
> - Ed
>
>
>
> On Fri, Apr 29, 2022 at 7:38 AM Ted Lemon <mellon@fugue.com> wrote:
>
> The difference is that NAT44 made things better. NAT66 arguably doesn’t.
> Pretty clearly there is a better alternative for the specific pci case
> we’ve been discussing.
>
>
>
> This doesn’t mean people won’t do nat66 out of habit anyway, but it will
> cost extra and add no value, so I don’t see any reason why it would become
> and remain a best practice.
>
>
>
> On Fri, Apr 29, 2022 at 10:16 David Farmer <farmer=
> 40umn.edu@dmarc.ietf.org> wrote:
>
>
>
>
>
> On Thu, Apr 28, 2022 at 6:02 PM Mark Smith <markzzzsmith@gmail.com> wrote:
>
> On Fri, 29 Apr 2022 at 07:37, Xipengxiao
> <xipengxiao=40huawei.com@dmarc.ietf.org> wrote:
>
> > My point is, given PCI DSS 4.0 (what Jen wrote as PCR DSS 4.0), we
> should tell enterprises they no longer need NAT. But if some enterprises
> still insist, respect their decision.
>
> Ignore them. IPv6 doesn't solve any problem they have, and adding NAT
> to IPv6 still won't solve any problem they have, because IPv6 still
> won't solve a problem they have.
>
> ...
>
> Even government mandates to get enterprises to adopt a networking
> protocol don't work - the Internet is supposed to be running CLNS by
> now as mandated by governments around the world. (I expect Vint Cerf
> was being nice while working on this rather than truly believing OSI
> would take over.)
>
> Explaining the Role of GOSIP
> https://www.rfc-editor.org/rfc/rfc1169.html
>
>
>  It's more important to get enterprises to use IPv6 ASAP, than to
> insist that they use the "right" IPv6 solution.
> >
>
> Why is it important to get enterprises to use IPv6 ASAP?
>
>
> Regards,
> Mark.
>
>
>
> Ignore credit cards and enterprises, that's your advice for IPv6?
>
>
>
> So, no one using IPv6 wants to get paid for anything? Or, are you
> suggesting we maintain a quaint IPv4 network in the corner, so we can do
> credit cards and can get paid?
>
>
>
> As for enterprises, Google and AWS are enterprises, are you suggesting
> they should be ignored too? Most of the valuable things on the Internet are
> run by enterprises.
>
>
>
> Supporters of IPv6 need to very much care about enterprises; We need them
> to make their content available via IPv6. We need them to enable IPv6 on
> the Internet-facing parts of their networks.
>
>
>
> Do we need them to enable IPv6 on their internal networks, maybe or maybe
> not. However, if enterprises are not comfortable with IPv6 why would they
> enable their content over IPv6?
>
>
>
> I'm not suggesting we have to do NAT66 or even NPTv6, however, I think we
> should have something to tell those doing NAT44 today and want to maintain
> an internal private network. Maybe ULA with application gateways and
> proxies instead of NAT. But I don't think the internal private network
> model is just going to go away, too many people are comfortable with it.
>
>
>
> Furthermore, ignoring NAT44 from a standardization point of view worked so
> well the last time. "Ignore them, and they will go away," didn't work last
> time and it's not going to work this time either.
>
>
>
> Thanks
>
>
>
>
>
> --
>
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE
> <https://streaklinks.com/BByrD6ad3b0OpBiK1wctjpyV/https%3A%2F%2Fwww.google.com%2Fmaps%2Fsearch%2F2218%2BUniversity%2BAve%2BSE%3Fentry%3Dgmail%26source%3Dg>
>       Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>
>
>
> --
>
> Ed Horley
>
> ed@hexabuild.io | (925) 876-6604
>
> Advancing Cloud, IoT, and Security with IPv6
>
> https://hexabuild.io
>
> And check out the IPv6 Buzz Podcast at
> https://packetpushers.net/series/ipv6-buzz/
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>
> ᐧ
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>
>
>
>
> --
>
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE
> <https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g>
>       Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
-- 
===============================================
David Farmer               Email:farmer@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================