Re: [v6ops] Implementation Status of PREF64

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 14 October 2021 06:55 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27E353A0CD6 for <v6ops@ietfa.amsl.com>; Wed, 13 Oct 2021 23:55:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level:
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hsDJRtOv; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=F+spR3QR
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZCAoSi_dZ31m for <v6ops@ietfa.amsl.com>; Wed, 13 Oct 2021 23:55:51 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14A9F3A0CD2 for <v6ops@ietf.org>; Wed, 13 Oct 2021 23:55:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12152; q=dns/txt; s=iport; t=1634194550; x=1635404150; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=zxdX+U4/wEgSBDEhWCCKzYPX9GNzQkUP0Zn8zZrp/Zg=; b=hsDJRtOv6GfU8yy1Wa7H8uhq92BDB0ANJXWjk75++gwWx4b8uq4Osu42 8qWn2hVFnt47rDDDLm0nl+h7UrSInOG4NwztxaTdtXaYM+Mtzd5vP1Guk i5gnzD64AMSd1wqq8cqrJm+iH56CgTFMvVLQYuShidW62+kCueuGdUsJ9 k=;
IronPort-PHdr: A9a23:EAIA0RxOs7ZoLyrXCzPBngc9DxPP8534MwoS7JVhgLVLIeyv/JXnaUrY4/glzFrERp7S5P8Mje3K+7vhVmoN7dfk0jgCfZVAWgVDhZAQmAotU8KIDUr9I7jhaClpVMhHXUVuqne8N0UdEc3iZlrU93u16zNaGhj2OQdvYOrvHYuHhMWs3Of08JrWMG11
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BWAACs02dh/4ENJK1aHAEBAQEBAQcBARIBAQQEAQFAgUUHAQELAYFQIy4Hd1o3MYRHg0cDhFlgiAsDj32Kc4EugSUDVAsBAQENAQEqCwwEAQGEfgIXgjICJTQJDgECBAEBARIBAQUBAQECAQYEgREThWgNhkIBAQEBAgEBARAREQwBASwLAQQLAgEIGAICJgICAiULFRACBA4FIoJPAYJVAw4hAQ6fXQGBOgKKH3qBMYEBgggBAQYEBIE2AYNTGII1AwaBECoBgwOCdVRLhnMnHIFJRIE8DBCBZko3PoJjAQECgTULBhiDGDeCLotEEFsOCTAYQREQTwELBSUMMgoRDlENHg+RLC0rgxGoeAqDMJ5tBSyDaotsl0E0lVSgYQiFAQIEAgQFAg4BAQaBYTuBWXAVOyoBgj5RGQ+OIINyhRSFSnQCNgIGAQoBAQMJkFqCRgEB
X-IronPort-AV: E=Sophos;i="5.85,371,1624320000"; d="scan'208";a="946130569"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Oct 2021 06:55:49 +0000
Received: from mail.cisco.com (xbe-aln-001.cisco.com [173.36.7.16]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 19E6tnXh027038 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 14 Oct 2021 06:55:49 GMT
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xbe-aln-001.cisco.com (173.36.7.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 14 Oct 2021 01:55:49 -0500
Received: from xfe-rtp-002.cisco.com (64.101.210.232) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 14 Oct 2021 01:55:49 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Thu, 14 Oct 2021 02:55:48 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OHAa8aymKY76rKG8/VhBABi9j8EJwby1BH2YzAFfJwx7/RxXvBA3aexO3J+AHfhux/vmbspt6Nb47vznHa+RLch2Hlh+Q5Be7NxW7s2gLwGjrUOtc5bMPiR9BFAu+cG567SbCGSH5z6Z/P09d0lh1pYSsMPQqa+RuraCOv5qDMJDGQx0nOwjiMKR1OaM6LCrb6donU0+Lq4VS5HSkeHoOmIUAbrxZj3Z7rPIxxE0tfn8MbpAfUUC+6QURb9KHJzgcdGDssUfcTBVuBocLzmmGmr25PkcE+Qh7x5Tq0HmVOKFo+MdyESSWo5YdZhDx29NXAMA527T0RlIY3BvvMJNjA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zxdX+U4/wEgSBDEhWCCKzYPX9GNzQkUP0Zn8zZrp/Zg=; b=JR3oEvBLXecVS3rrV9ANFAHylvrJfH8cjSQH0dv+DwufNYfaolMQG1/0B1AF/6BIVTHk8QrJntSPUyr2naZi5YNSQ0pJvkQ67GOxRTkHR4bCdRP1bjRPENYmrjUt18CJH1sEflWaXf1jYnpkIC+jFZQvsOyP7OMc2qht6j6VHXmfwGgL6YuGBCSoN7rJZDCEDW+OMBpGnlpCkPGC/EO2xqC6mwFDeLW5E6VKhbNP5kLwlgxm8jf7AsrfckXFlNyJOyCdy4c67gQPQgEthGM3Qc7dRzGOX44+7Ux8/pTCaA2QhDXErgeg9pEU+ce192hOI/FniDm9pxd2+bTBULc5ig==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zxdX+U4/wEgSBDEhWCCKzYPX9GNzQkUP0Zn8zZrp/Zg=; b=F+spR3QRiN7ZPofp4fUXtyAdJE7J2CiZq7LDZXVjTGVF/9otI9WMUHSW5gUYZQ5JMSMSMwqG4NasLXRpNTJOy8NCdiF6MwTiR4yHEPItMfob99sNATbPcgkVrKLtRkzfTxYKGJX/02MwjjsYWkh/u7wZuPEiJcViXxFTCpk8n2w=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by MWHPR11MB1613.namprd11.prod.outlook.com (2603:10b6:301:e::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.16; Thu, 14 Oct 2021 06:55:47 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302%9]) with mapi id 15.20.4608.016; Thu, 14 Oct 2021 06:55:47 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Owen DeLong <owen=40delong.com@dmarc.ietf.org>
CC: Owen DeLong <owen@delong.com>, "v6ops@ietf.org" <v6ops@ietf.org>
Thread-Topic: [v6ops] Implementation Status of PREF64
Thread-Index: AQHXtcqCWIXFodZSLkqGGYs1FKD2lqu8KpsAgAATjsCAAA3zgIAACv0ggABlhICAAIk5gIAABwOAgAAV5ACAACIiAIAABJcAgAAReQCAAAnwAIAIt5qAgADLCICAAEmcgIAAH5EAgAVuKoCAADeDAIAAEToAgAAa0QCAAKQ0gIAAA7yAgADQKgCAADo7sIAAe4cAgAAN9ACAAAYz9YAAAaIAgAAwLoCAAWU9gIAAB6AAgAAthdCAACSvgIAAkCjS
Date: Thu, 14 Oct 2021 06:55:47 +0000
Message-ID: <778CB8A4-7F82-4792-A347-27C6C5A70624@cisco.com>
References: <CAKD1Yr10OKMJ1y8bs5xpt6jS8ZWsqs66oFCXmp-QLySS5Yn4hg@mail.gmail.com> <5DF8D1AE-4B54-429F-962A-488F2AA1F895@delong.com> <CAPt1N1ma45GKqXcvjHUGCYFKVbEGp3OuT013pZhrnOkFFLMiQA@mail.gmail.com> <CAKD1Yr2Pe+=tNkA7Ou9KeMkgFhcdSb8WxgVn1w9MauusMEhRcw@mail.gmail.com> <CO1PR11MB4881076DFF8A145C8CD818B8D8B69@CO1PR11MB4881.namprd11.prod.outlook.com> <A188D974-3CEB-497F-93EA-B66C77D2CA90@delong.com> <YWW1ghmjueHmfCEb@Space.Net> <m1maKp6-0000I3C@stereo.hq.phicoh.net> <YWW8FPkRuxCBFp3o@Space.Net> <D0510DEB-04FF-4864-9363-6FC40C686C22@delong.com> <YWcQKwK3lAKpl7y1@Space.Net> <DFD526B0-7CA3-4445-910F-425142C0AEDA@delong.com> <802A4F47-5DB0-4986-894D-2B20BA09FF24@cisco.com> <36CB5B2A-2469-4E51-9536-D16B66BE3B6E@delong.com>
In-Reply-To: <36CB5B2A-2469-4E51-9536-D16B66BE3B6E@delong.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: delong.com; dkim=none (message not signed) header.d=none;delong.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3a783fc9-6213-42f2-3a25-08d98edfa6b7
x-ms-traffictypediagnostic: MWHPR11MB1613:
x-microsoft-antispam-prvs: <MWHPR11MB1613BEDE95E4AA5BCEECB685D8B89@MWHPR11MB1613.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(64756008)(5660300002)(66476007)(66946007)(8936002)(6512007)(66446008)(8676002)(66556008)(4326008)(91956017)(6486002)(316002)(76116006)(71200400001)(508600001)(6506007)(966005)(33656002)(2906002)(38100700002)(122000001)(53546011)(26005)(54906003)(83380400001)(186003)(66574015)(38070700005)(36756003)(2616005)(86362001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a783fc9-6213-42f2-3a25-08d98edfa6b7
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Oct 2021 06:55:47.2705 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NhMbz+juYiHC/clFQ5LrcCUX7LzoxfY2xt22v3qEhixpqKVuvORSCJ0o9dW0NmE56pEaXJ625qWnD4UWBFpKFw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1613
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xbe-aln-001.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/GeQ7UD8LWdXujarxXvIYfvMwcOo>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Oct 2021 06:55:56 -0000

Hello Owen


> 
> 
> 
>> On Oct 13, 2021, at 13:08 , Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org> wrote:
>> 
>> Hello Owen 
>> 
>> The thing of the past is probably still perfect in some unmanaged networks but I understand that your focus is not those.
>> 
>> /64 came with neatly with EUI 64 as you point out, and we are deprecating that for privacy. 
> 
> Yes, but we’re choosing a new form of 64-bit random number to take its place, so from my perspective, it’s still basically
> a form of EUI-64 addressing even though not based on the actual MAC address.
> 
>> Switching better than routing in the domain we call a subnet is also becoming obsolete since even when we think we switch we probably route at L2 or in an underlay.
> 
> I guess that depends on how you define “L2 routing”. My definition is of routing involves deprecating the hop count (TTL in v4) and replacing the L2 headers. Forwarding
> at L2 is (mostly) one of repeating or bridging (which usually called switching due to differences in hardware between modern switches and traditional bridges). Repeating
> is what happened in old UTP hubs and even older DELNI boxes.

Yes terminology… for your points above routing is preferable and that’s exactly what I m getting at. Then there’s the major hassle of the broadcast domain. I take it that we agree and move on.

> 
>> Bottom line is that /64 is still an interesting boundary for backward compatibility and old habits to form a group we call a subnet. But I agree with Gert that we do not need to give that much to that’s exactly my pevery host just to be able to route inside the subnet at L2. 
> 
> Need is an interesting thing, but I don’t think it’s particularly relevant. I think the true question is what is useful to do and doesn’t pose an undue threat to addressing in the process. I think /64 meets that test.
> 
> Depending on your definition of “need”, we could claim that each device only needs one address behind which it can nat everything else on the device or behind the device and use ULA there. That’s not the model of IPv6 I want to see deployed, but if you push the bare-bones need argument far enough, that’s where you end up.
> 
> I’d much rather see us do reasonable addressing, issuing reasonable subnets (/64 seems perfectly fine to me) and one on.

I’m totally happy with /64 subnet. Then there’s the terminology again and old concepts that make little sense. What do we call a subnet today ?  I like to consider it as an administrative group with the main property that you do not need to renumber as long as your mobility is between routers that serve that group. Other property is that it is the final aggregation that the infrastructure serves. 

With a definition like this it is possible to assign any portion of the address space to the nodes, as long as we prevent overlap. E.g. assign one or more /96 to Calico to map IPv4 10.0.0.0/8 Private Spaces in a cloud server.

 To partition a subnet in any fashion we like we need routing inside the subnet. And DHCP PD could be a tool to get there.

> 
>> We can easily route to /112 or even to /128. I’m used to the latter because we build subnets of thousands of nodes in IoT and we know the nodes from a registrar, typically DHCPv6. But I see benefits of giving a prefix to the phone or the PC and let it distribute the addresses to stuff like VMs and tethered nodes.
> 
> Meh. If that works for you in your environment, more power to you.
> 
>> Why insist on /64 per host? Seems to me that the properties that we want do not depend much on where we cut.
> 
> I’m not insisting on any particular size in any given network’s implementation. I am insisting that we don’t put silly limits on what people can do because someone has a misguided fear of running out of prefixes.

I guess we agree. I wish to give more power to netops to do what they want inside their subnet. Forcing a single broadcast domain and only /128 is incredibly restrictive and totally decoupled from modern needs.

> 
>> What’s really interesting is to decouple the domain we decide is a subnet from a L2 broadcast domain and from what we see as an IP link. For that you need L3 routing inside the subnet. The /(>100) per host gives you all that.
> 
> Why would we want it?
> 

Real world exemple: 

Say I have a large campus, with WiFi coverage throughout. Say I want to move around with no renumbering. Say that when I print I want the printer to be the one in my room wherever I am in the campus.

The traditional IPv4 approach is the get an address from the subnet that is served by the AP that you connected to when you entered the campus and tunnel there when you move beyond the small area covered by the subnet. Meaning that your broadcast domain remains that small area and your prints will always get there.

With IPv6 a subnet could easily span the campus, but the broadcast domain could not. Ideally the node would see:

- a broadcast domain with mDNS devices such as the printer down the corridor. This means limited to one open space or a few smaller rooms

- an IP link to the routers that serve the broadcast domain. The box that we call an AP could easily serve as router and/or ND routing proxy (RFC 8929) within the subnet (call it a L3 AP just like your switch is probably an L3 switch).

- An IP subnet that has enough capacity to serve the whole campus.

We could easily be providing all this to our customers but we’re not. We prefer sterile discussions at 6MAN or NANOG and the consequence of our inaction is that they keep deploying  IPv6 as if it was IPv4 with little to no evolution/ benefit. And we complain for the lack of adoption!

Please, peace: we have 20 years of experience that a discussion for the sake of discussing does not get us anywhere. Could we for once work on an acceptable trade off?

Your point: our common customers want one state per device because state is expensive. They do not want uncontrolled address allocation and silent nodes that come with it. They have that with IPv4 do not want to loose that going v6. I share that view and observe the same thing.

Also: They do not want broadcast storms that clog their bandwidth, waste energy and spectrum. They want to scale to a campus or a factory without renumbering.  They want simple (flat) networks as opposed to the tunnels above. They want service for the end users, e.g., the nearest printer.

Looking for a consensus:

You want to assign/128 to the host and defend the case of the use of DHCP in the managed subnet.

Lorenzo does not want /128 to the host but agrees with DHCP PD.

Gert wants to avoid the waste of address space just because we can. 

A prefix to the host gives Lorenzo the addresses he needs for his devices.  It gives your customers the single state per logical node that they want. It allows to separate what netops manage (down to /64 and direct assignment within) and devops (whatever they do with the longer prefix they get for their node). It does not impose any size for what’s assigned, could be a different thing for each host. It means routing inside the subnet which removes the dreadful broadcast domain.

I see an opportunity for consensus. Can we work that out together and bring a real IPv6 value?

Pascal 

> Owen
> 
>> 
>> 
>> Regards,
>> 
>> Pascal
>> 
>>>> Le 13 oct. 2021 à 19:26, Owen DeLong <owen=40delong.com@dmarc.ietf.org> a écrit :
>>> 
>>> 
>>> 
>>>> On Oct 13, 2021, at 09:58 , Gert Doering <gert@space.net> wrote:
>>>> 
>>>> Hi,
>>>> 
>>>> On Tue, Oct 12, 2021 at 12:39:43PM -0700, Owen DeLong wrote:
>>>>>> (ceterum censeo, /64 was not a very smart decision)
>>>>> We can agree to disagree. So far, I???ve seen no data to support that.
>>>> 
>>>> Indeed.
>>>> 
>>>> So far I have not seen any data that supports "/64 was a good idea" :-)
>>> 
>>> It’s working quite well in a number of networks I’ve deployed.
>>> 
>>> It’s convenient for EUI-64 addressing.
>>> 
>>> Reviewing the record, it seems we were destined for something like 64-bit
>>> addressing overall before IETF decided to consider EUI-64 addressing and
>>> added 64-bits to the plan, so one can argue that without the idea of
>>> universal /64 addressing we’d have a whole lot fewer network numbers
>>> available.
>>> 
>>> So now you have seen data to suggest that /64 was a good idea.
>>> 
>>> Do you have any data support your claim that /64 was not?
>>> 
>>> Owen
>>> 
>>> _______________________________________________
>>> v6ops mailing list
>>> v6ops@ietf.org
>>> https://www.ietf.org/mailman/listinfo/v6ops
>> _______________________________________________
>> v6ops mailing list
>> v6ops@ietf.org
>> https://www.ietf.org/mailman/listinfo/v6ops
>