Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)
"Mudric, Dusan (Dusan)" <dmudric@avaya.com> Mon, 08 July 2019 17:05 UTC
Return-Path: <dmudric@avaya.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D553D120288; Mon, 8 Jul 2019 10:05:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=avaya365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QN8GguAy-F-w; Mon, 8 Jul 2019 10:05:45 -0700 (PDT)
Received: from p-us1-iereast-outbound.us1.avaya.com (p-us1-iereast-outbound.us1.avaya.com [135.11.29.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE46212029B; Mon, 8 Jul 2019 10:05:28 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IPAS-Result: A2ENAAA1dyNd/wUHmMZlGwEBAQEDAQEBBwMBAQGBUwYBAQELAYFDUG1yAwQzCoQSg0cDhFKJeYJbl0aBLhSBEAMYPAkBAQENASMKAgEBAoECgzwCF4IiIzQJDgEDAQEBBAEBAQEEAQICaYo3DIJ4TS8KAi8BAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBBQIPJAUeAQEYAQEBAQMSEREMAQEsCwELBAIBCA0EBAEBAwImAgICMBUFAwgCBAENBQgRAgeDAYFqAx0BAgIKnzECgQgwiF8BAXCBMhoCgl0BAQV1hAgYghIJCQGBAigBhHGCfFSBf4EeF4FBPiZrRoJMPoJhBBiBCwkBEgEJGIMIMoImi3kIARwvgiOaeQZnCQKCF4ZWgUGHfoE8gk6CLG2GNAWDdAOKNYMliguHQIwVg2gCAgICBAUCDgEBBYFQOWdxcBUaIYJsCYI4N4FqgVCKU3KBKYsFgSIBgRULAQE
X-IronPort-AV: E=Sophos;i="5.63,466,1557201600"; d="scan'208";a="354786397"
Received: from unknown (HELO co300216-co-erhwest.avaya.com) ([198.152.7.5]) by p-us1-iereast-outbound.us1.avaya.com with ESMTP; 08 Jul 2019 13:05:25 -0400
X-OutboundMail_SMTP: 1
Received: from unknown (HELO AZ-US1EXHC02.global.avaya.com) ([135.11.85.13]) by co300216-co-erhwest-out.avaya.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Jul 2019 13:05:26 -0400
Received: from PWEXCVMAP02.global.avaya.com (135.11.85.81) by AZ-US1EXHC02.global.avaya.com (135.11.85.13) with Microsoft SMTP Server (TLS) id 14.3.439.0; Mon, 8 Jul 2019 13:05:24 -0400
Received: from PWEXCVMAP01.global.avaya.com (135.11.85.80) by PWEXCVMAP02.global.avaya.com (135.11.85.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1531.3; Mon, 8 Jul 2019 13:05:24 -0400
Received: from PW365VMAP01.avaya.com (135.11.29.21) by PWEXCVMAP01.global.avaya.com (135.11.85.80) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1531.3 via Frontend Transport; Mon, 8 Jul 2019 13:05:24 -0400
Received: from NAM05-BY2-obe.outbound.protection.outlook.com (104.47.50.54) by PW365VMAP01.avaya.com (135.11.29.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1531.3; Mon, 8 Jul 2019 12:05:24 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Avaya365.onmicrosoft.com; s=selector1-Avaya365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qWZBVMXmKdAqewZLwGlRQcoG18MUbUPcITG6yY6fpGw=; b=Q72BmmY1yoBCI9XDuWXxdKXy5WYGSNMAsAf1n6v+eUrZPiDko7rZAm0IpePh0IcNk3icTI+aQhiZCh/Kkhitl//mtR4tyJFnJb/3mHfEjAfuOif0MgUVBv9dzcceMH3Pld1PXqfhJYqcDtOZ+jGNFiCESxnlstMTwZ2C6mqYXzQ=
Received: from DM6PR15MB2506.namprd15.prod.outlook.com (20.176.71.32) by DM6PR15MB2218.namprd15.prod.outlook.com (20.176.66.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.16; Mon, 8 Jul 2019 17:05:22 +0000
Received: from DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::e0dd:fb47:323c:d5ac]) by DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::e0dd:fb47:323c:d5ac%7]) with mapi id 15.20.2052.020; Mon, 8 Jul 2019 17:05:22 +0000
From: "Mudric, Dusan (Dusan)" <dmudric@avaya.com>
To: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>, Éric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
CC: "v6ops@ietf.org" <v6ops@ietf.org>, "draft-ietf-v6ops-nat64-deployment@ietf.org" <draft-ietf-v6ops-nat64-deployment@ietf.org>, "v6ops-chairs@ietf.org" <v6ops-chairs@ietf.org>
Thread-Topic: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)
Thread-Index: AQHVNQqR9AuYKo+zy0GlsxLQOHlx1KbA88Uw
Date: Mon, 08 Jul 2019 17:05:21 +0000
Message-ID: <DM6PR15MB25060E17A5E8CDBF2B01C0B8BBF60@DM6PR15MB2506.namprd15.prod.outlook.com>
References: <156250429326.14626.2912462164177679261.idtracker@ietfa.amsl.com> <75A5EB61-3879-4F83-83BB-D65EE8799AF3@consulintel.es>
In-Reply-To: <75A5EB61-3879-4F83-83BB-D65EE8799AF3@consulintel.es>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dmudric@avaya.com;
x-originating-ip: [104.129.196.166]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 93003c28-52a7-46ba-bbdc-08d703c67671
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM6PR15MB2218;
x-ms-traffictypediagnostic: DM6PR15MB2218:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR15MB2218DF755E1DB51A3B643581BBF60@DM6PR15MB2218.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-forefront-prvs: 00922518D8
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(366004)(346002)(39860400002)(396003)(376002)(199004)(189003)(51444003)(13464003)(52536014)(53936002)(71200400001)(3846002)(71190400001)(186003)(110136005)(6116002)(76176011)(25786009)(55016002)(86362001)(7696005)(5024004)(30864003)(76116006)(53546011)(66476007)(102836004)(224303003)(6506007)(54906003)(256004)(99286004)(316002)(9686003)(14444005)(6306002)(966005)(446003)(26005)(8936002)(66574012)(305945005)(66066001)(4326008)(81166006)(7736002)(14454004)(55236004)(66946007)(68736007)(5660300002)(81156014)(6246003)(486006)(2906002)(73956011)(74316002)(33656002)(19627235002)(476003)(66446008)(11346002)(229853002)(66556008)(64756008)(478600001)(6436002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR15MB2218; H:DM6PR15MB2506.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: avaya.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: jtZFxV+a+WWsbfHjgP2RTg8y8C/eo76JyPCQXwg7mLuT4YqN+whpPI6TPk/GKDsJhalDqjGcoNpvG6ZZpcbMmm6SDNTMcgWBkmdn3PV5ifulRVAk2X19T2w+RZ48qw2VPEcNl3H+94xmamVhb/5j5Zj+OgGi2C2E9IACh3mR1xnS2CApLobRwBFWrvN4Wx3K9E6q6rdMcecQyQkM2dHpZFtKjE+FRFZQ7abDGvrKLg0i7Jny3+NUlsXviHyjERysHFz+80xoszk90mF+NhBMKk/VN1fqK7a3csYzu3N35Tb+MsCyKU8I/CNeV3/qTxQcz+0BmyhdBKanZcoJrnOBjdckPkXThEOwtdb8U//uob4BkGvmSpkuKmgSgI44K9NrQbzMQ9w4y7pa8DpeNmdAo+h7o+zmNKcAAMNYx4CFjsw=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 93003c28-52a7-46ba-bbdc-08d703c67671
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jul 2019 17:05:21.9978 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 04a2636c-326d-48ff-93f8-709875bd3aa9
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dmudric@avaya.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR15MB2218
X-OriginatorOrg: avaya.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/AnEbM8k8wyL6WoCHEi5HGha6S08>
Subject: Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jul 2019 17:05:56 -0000
Section 3.3: "if the network must support applications using any of the following: o IPv4-only hosts or applications Then, only the scenarios with 464XLAT, a CLAT function, or equivalent built-in local address synthesis features, will provide a valid solution." Which document explains how 464XLAT and a CLAT function provide connectivity from IPv4only-host to IPv6only-host? Thanks, Dusan. > -----Original Message----- > From: v6ops <v6ops-bounces@ietf.org> On Behalf Of JORDI PALET > MARTINEZ > Sent: Sunday, July 7, 2019 5:24 PM > To: Éric Vyncke <evyncke@cisco.com>; The IESG <iesg@ietf.org> > Cc: v6ops@ietf.org; draft-ietf-v6ops-nat64-deployment@ietf.org; v6ops- > chairs@ietf.org > Subject: Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64- > deployment-06: (with COMMENT) > > Hi Eric, > > Thanks a lot for your review! > > Comments in-line below. Most of them I will reword some text or correct > nits, but there are a couple of questions for you to clarify. > > Regards, > Jordi > @jordipalet > > > > El 7/7/19 14:59, "v6ops en nombre de Éric Vyncke via Datatracker" <v6ops- > bounces@ietf.org en nombre de noreply@ietf.org> escribió: > > Éric Vyncke has entered the following ballot position for > draft-ietf-v6ops-nat64-deployment-06: No Objection > > When responding, please keep the subject line intact and reply to all > email addresses included in the To and CC lines. (Feel free to cut this > introductory paragraph, however.) > > > Please refer to https://urldefense.proofpoint.com/v2/url?u=https- > 3A__www.ietf.org_iesg_statement_discuss- > 2Dcriteria.html&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=UT3Bk9cbLeaJ > xhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5wlVLDWKPA2DvW0t > rvZwSDh5SnT8LOzdg&s=LwRXKT1d-8SS5QiUbHNrp33o3TBAeLqgs9RN- > UwC0Yg&e= > for more information about IESG DISCUSS and COMMENT positions. > > > The document, along with other ballot positions, can be found here: > https://urldefense.proofpoint.com/v2/url?u=https- > 3A__datatracker.ietf.org_doc_draft-2Dietf-2Dv6ops-2Dnat64- > 2Ddeployment_&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=UT3Bk9cbLe > aJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5wlVLDWKPA2DvW > 0trvZwSDh5SnT8LOzdg&s=PHW- > a847Dg670Srlft54euH86mfhpwcaNiqzcBPS8v4&e= > > > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > Hello Jordi, > > Thank you for the work put into this clear and well-written document. > > I only wonder whether section 3 and section 4 should be swapped for a > more > logical flow: explain the issues, then describe working solutions. Probably > too > late in the publication to change though. > > I think that will be a major change, because I've a lot of references to the > "possible" deployment scenarios to explain the different issues. My "flow" > was thinking in how you can deploy it, and then what are the issues that you > need to consider. > > The underlying message of "464XLAT solves everything" is annoying but I > must > admit that this is true ;-) > > This document started as 464XLAT deployment guidelines, and the WG asked > me to turn it also to "NAT64". I think that explains it, but in any case, as you > well say, it is true ... and there is explicit text to indicate that if you're sure > that everything inside the network is supporting IPv6, no literals, etc., then it > may be fine with just NAT64. However we all know that this is a non-realistic > scenario. > > Please find below many COMMENTs in the hope of improving the > readability and > factual data points in the document. > > -éric > > == COMMENTS == > > Is there a description of the use of DNS64 in the host as it fixes the DNSSEC > issues ? (except in section 3.2.2.) > > Not sure to completely understand what you mean here, just trying ... This is > not something that the service provider can solve, as it is up to the OS (for all > the devices in that network). That's why I think is not something for this > document. However, I just realized that this is described in section 7.2 of > RFC6147. I can add a reference to that in section 3.2.2. > > -- Section 3.1 -- > > "known to work": can you add references or data backing this statement ? > > Well, those are the models being used today in cellular and broadband > networks. So I can just say that? > > -- Section 3.1.1 -- > > When discussing scenarii, please refer to the figure ID in the text for clarity. > > Done (I'm already editing a new version while writing this, pending on some > that you can provide to my comments). > > -- Section 3.1.2 -- > > It is unclear to me whether "The support of this scenario" refers to the > UE-only or the CPE deployment. > > It is referring to the "service provider network support". Will clarify it. > > Same demand as above: please refer to the figure ID in the text for clarity. > > Done! > > -- Sectio 3.2.1 -- > > I really wonder whether it is useful to describe this scenario as 'working > under special conditions'... those 'special conditions' will probably never > met > in real life. > > More generally, I am unsure about the value of the whole section 3.2 (it is > more like an academic thing). > > I think some of those scenarios are possible in some networks, may be not > connecting to Internet, or for example, you may want to configure explicit > mappings, which can be done with EAM. I just realized that I've not cited > that. I will do. > > -- Section 4.1.1. -- > > Can you add reference and/or data for "monitored by some governmental > bodies > and other institutions". > > I believe that was pointed out by somebody in the WG, but it is true that > some regulators do that. I recall having seen something about that in France, > but I'm not 100% sure right now. > > Please add a reference for the use of "ipv4only.arpa". AFAIK > > Right, this is defined by RFC7050, done! > > draft-cheshire-sudn-ipv4only-dot-arpa appears to be dormant/dead. > > This is one of the issues that I've commented with Warren, responding to > IANA. I understand he is sponsoring that document. > > > -- Section 4.1.2 -- > > The leading paragraph is a little confusing as it assumed that CLAT exists > (stated in the text but not in the section title). > > Will clarify it. > > -- Section 4.1.5 -- > > The section title is rather misleading "ACL of clients" and I wonder why a > dual-stack client would use a DNS64 server as its recursive DNS server. Isn't > it an obvious configuration mistake? > > No, I think that text is correct, but I will try to reword it to make it clearer. You > may have a situation with IPv4-only servers, which are located, in the path > between the dual-stack hosts and the NAT64. So, if the DNS64 is not > configured to exclude those servers, it will synthetize the AAAA records and > they will become unreachable. So that's why bind and other DNS64 servers > provide this ACL function. > > -- Section 4.4.1 -- > > Some explanations of the consequences of a foreign DNS would be > welcome. > > Done! > > -- Section 4.4.2 -- > > Rather than using "DNS privacy" please use "DNS request confidentiality" > as the > DNS64 will learn/glean about the client activities. > > I used this terminology as it was suggested as the common one for the > different protocols in this category. I will try to confirm if is the right one just > in case. May be rewording the title as "DNS Privacy/Encryption Mechanisms" > ? > > > > -- Section 4.6 -- > > Please explain why older API is a problem (or rather rephrase it into > applications using IPv4-only API). > > Done! > > -- Section 4.10 -- > > draft-ietf-tram-turnbis is also able to support IPv6-only client. It is > currently in the same IESG status as this document. > > Definitively, will add a reference to it! > > -- Section 5 -- > > Please add data/references for "with hundreds of millions of users" > > I can cite several cellular networks, but I will do in a generic way, I don't think > we should mention explicit providers, right?. > > -- Section 7 -- > > Not so much about security but about privacy. I would appreciate to have > some > text around the lack of privacy when using an external DNS64 as this server > will learn about all clients activities. > > Good point, thanks. Will do! > > == NITS == > > Generally, please refrain from using "HEv2" in place of "Happy Eyeball > version > 2". > > Done! > > -- Section 3.1.1. -- > > Figure 1 shows a box containing both NAT64 and DNS64 while those > functions > could reside in different devices. > > Will clarify it. > > s/One more equivalent scenario/One additional equivalent scenario/ ? > > Done! > > -- Section 4.1 -- > > s/to an IPv6-only WAN/to an IPv6-only access network/ > > Done! > > > _______________________________________________ > v6ops mailing list > v6ops@ietf.org > https://urldefense.proofpoint.com/v2/url?u=https- > 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp > l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9 > ZufQAIc5wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=wOPWzlIjnoqYXR0OM > bl5dJswrnnMmmTX2ymOmmJ0Rfo&e= > > > > > ********************************************** > IPv4 is over > Are you ready for the new Internet ? > https://urldefense.proofpoint.com/v2/url?u=http- > 3A__www.theipv6company.com&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64 > Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5 > wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=DJpxsc514- > zcfBAFS4ksUO1Az_LzLKo1Da80uIg60JA&e= > The IPv6 Company > > This electronic message contains information which may be privileged or > confidential. The information is intended to be for the exclusive use of the > individual(s) named above and further non-explicilty authorized disclosure, > copying, distribution or use of the contents of this information, even if > partially, including attached files, is strictly prohibited and will be considered a > criminal offense. If you are not the intended recipient be aware that any > disclosure, copying, distribution or use of the contents of this information, > even if partially, including attached files, is strictly prohibited, will be > considered a criminal offense, so you must reply to the original sender to > inform about this communication and delete it. > > > > _______________________________________________ > v6ops mailing list > v6ops@ietf.org > https://urldefense.proofpoint.com/v2/url?u=https- > 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp > l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9 > ZufQAIc5wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=wOPWzlIjnoqYXR0OM > bl5dJswrnnMmmTX2ymOmmJ0Rfo&e=
- [v6ops] Éric Vyncke's No Objection on draft-ietf-… Éric Vyncke via Datatracker
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… JORDI PALET MARTINEZ
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… Eric Vyncke (evyncke)
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… JORDI PALET MARTINEZ
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… Mudric, Dusan (Dusan)
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… JORDI PALET MARTINEZ
- Re: [v6ops] Éric Vyncke's No Objection on draft-i… JORDI PALET MARTINEZ