Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]

Nick Buraglio <buraglio@es.net> Wed, 27 April 2022 15:04 UTC

Return-Path: <buraglio@es.net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F21EC23BED5 for <v6ops@ietfa.amsl.com>; Wed, 27 Apr 2022 08:04:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=es.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KcYn15AHViEd for <v6ops@ietfa.amsl.com>; Wed, 27 Apr 2022 08:04:16 -0700 (PDT)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6665C26E2A2 for <v6ops@ietf.org>; Wed, 27 Apr 2022 08:04:15 -0700 (PDT)
Received: by mail-lj1-x230.google.com with SMTP id y19so3029147ljd.4 for <v6ops@ietf.org>; Wed, 27 Apr 2022 08:04:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=es.net; s=esnet-google; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=ZKTXG9JBrEx1NaFEUez0BE6ICAd/qaJxZFVzTerolKc=; b=A+uDyj7LQFBcfvcf4dkujfSGD1YLr6gZbZ4CyTs9uXRJO9HFTFjeV5Aix5sidBaf/3 H5G96dlLmEincKC5cveF7vRtsgsMSiWwewKe4w3JvQXDaG8XYHzJ/CIBRmdfbm+V5qkF JdveMUNzM5ELzWZr37OMai9H7kYoKbo1LGpzF8ifiwMetjwKZOA1iJ6RJmGCRjuBd8my JjTo870piRGQM9/sQnkLrYIHInRe9WiBg9qg/9FhE4oz4/Agl3XQcnmAofCuclK/czgL 2f0Hxztk679TmPnCzg+n6/8Rr3QD8h7mgbBloa3uJDri9PkvtEb7nVVNEinwNOYs7xH7 rwlg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=ZKTXG9JBrEx1NaFEUez0BE6ICAd/qaJxZFVzTerolKc=; b=ASWAOKVOu/omqL0so1eAUpaHUwcGAtIGqnK04PCG1I3/zFCmKM2BdJXcv6xSMaKFvW DPyOsZkC+rXMj9jP8M3nkoZOGXJLOwIJ4bK4zc4VrWRIsAk0HNkLGjKBwQORVkWUlw1s 8mTS9NbuGtCwmk2EeleDIaT2ehpdTBAxlec3Rg1bNG7QBIP9vP9STYPJ8H4KrU25kXU4 AbSZn0ABM80ZJ/qXjAsDnvCWDYGZzWkWlghm78tHiEtXH5tFrZDBGd3ZQNNGCRX9my7d 1tBQg3VTCPsQSkwg1FssOZcMuPh8vDklqytssSfEtIBzRoTbPr8MJhx7CbB7644JB6au Qg9A==
X-Gm-Message-State: AOAM5315XE7Srnle1z8ed20ibPN1Z+9WHOdh3TllQf80ntK34QgS6ddx m6hUD0poDEIRCu1B3G68KwVv8aDlKuFiHq9b27ArrteM5hwnt2mU3ri/LvshTduJlv6hFr0r3kX YrZ6oIA3MvLtnWeZyGjj6a/3T2iNJFWY7aPV0PtgzMSmqNpbxgwFJywK72MKcR1312KjPYdFPYT 8=
X-Google-Smtp-Source: ABdhPJy1I/t2ZopImnSSAnHgAvtR3wXmqOD2xCm3EnPsXqFRbC8GjIQWlv0bMo6I0ZQflZ83rKEZAYJb2K9O3ZZ0Bl4=
X-Received: by 2002:a05:651c:210d:b0:24f:146c:698a with SMTP id a13-20020a05651c210d00b0024f146c698amr9009580ljq.362.1651071852958; Wed, 27 Apr 2022 08:04:12 -0700 (PDT)
MIME-Version: 1.0
References: <CAM5+tA8WvjvWirxqE6kQ9LQAG0NcpWyCLGVooB=G7gZ9ETb2zQ@mail.gmail.com> <20220424172743.GA218999@fg-networking.de> <CAKD1Yr1v0Tkh+pWD-ts=PL3gZf7Qj6OHW6Cuvj8iGcSSMibjew@mail.gmail.com> <0afe25f5-52b7-a438-0696-cf8b0a83c2dc@gmail.com> <BN8PR07MB70760D9693580F5BDCB61DD995F89@BN8PR07MB7076.namprd07.prod.outlook.com> <CAKD1Yr3Z9wGQ+uiA2WcW00MrOiLyHs+bSoFjHVtrixCi2qp4DA@mail.gmail.com> <BN8PR07MB7076A6456CAB48EF428D6E8695F89@BN8PR07MB7076.namprd07.prod.outlook.com> <65d0d9ac-77fc-c200-09e3-0c3949ca1541@gmail.com> <CAN-Dau2FS99ewfgH8xk-jSJFCnO92CJV9ZC98DUE2UDR7V1Eww@mail.gmail.com> <CANMZLAYbpZBDA8uFnJqfWfWTQ4S9RN4a-DqWe36qzfAfDtXiQA@mail.gmail.com> <CAN-Dau0BjRR2_7xz38DpJsz0Y=Z_8bV5n-=Eh1QUVEDzqVxmaA@mail.gmail.com> <CAM5+tA-YPT-r5YrHEQ-gZ6U7cQLo3s4y7n1DOrsS_s_xD8PzFw@mail.gmail.com> <CAKr6gn2RPKp69ExaQykn9eRO_22Q-3GaYyUfQarDh8FAAwvzSw@mail.gmail.com> <8cb7959c-1a82-d05c-8737-a3b05646ab1b@gmail.com>
In-Reply-To: <8cb7959c-1a82-d05c-8737-a3b05646ab1b@gmail.com>
Reply-To: buraglio@es.net
From: Nick Buraglio <buraglio@es.net>
Date: Wed, 27 Apr 2022 10:04:01 -0500
Message-ID: <CAM5+tA_VfGfp1w9wAh5_Bs3C+ZZkau+ORA4d_UBZm-76qke0xQ@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: George Michaelson <ggm@algebras.org>, David Farmer <farmer=40umn.edu@dmarc.ietf.org>, v6ops list <v6ops@ietf.org>, Ted Lemon <elemon@apple.com>, 6man list <ipv6@ietf.org>, Erik Auerswald <auerswald@fg-networking.de>
Content-Type: multipart/alternative; boundary="0000000000004bf92e05dda41fd4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/H3X9E9zT3mLnhzBPmKK7yiL8sZc>
Subject: Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2022 15:04:20 -0000

Without condoning address translation, yes, I think there is benefit in
revisiting RFC4864. a great many things have changed in 2007.

nb

ᐧ

On Tue, Apr 26, 2022 at 9:28 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> On 26-Apr-22 12:51, George Michaelson wrote:
> > I'm having tremendous deja-vu about at meeting at MV where Google was
> tracking IPv6 deloyment (this would be 15+ years ago) and somebody from
> PCI-DSS was telling me IPv6 would never meet their compliance needs and we
> misunderstood the standards imperative, if we thought IETF had any
> influence on how they certified needs in this IP space.
> >
> > Somehow I think the world has orbited a good number of kilometers,
> without significant change in mutual understanding.
>
> About 15 orbits round the Sun, I suspect. Hence, exactly, my question
> whether it's time to update RFC4864.
>
>     Brian
>
> >
> > _G
> >
> > On Tue, Apr 26, 2022 at 10:48 AM Nick Buraglio <buraglio@es.net <mailto:
> buraglio@es.net>> wrote:
> >
> >     My experience is pretty dated from my prior job, so take this with
> that caveat, but my understanding of PCI-DSS is that the “functional
> requirements” are highly interpretable and almost wholly up to the auditor
> discretion.
> >     For example, In the environment I was in the auditor deemed that
> VLAN ragged segregation was insufficient and that he required us to use a
> VRF. This was non-negotiable from the answers to my inquiry.
> >     I was told that Campuses almost exactly like ours with similar
> architecture but different auditors used VLANs just fine. We were also
> required to have an IPS when a passive IDS would have been completely
> sufficient.
> >
> >     Compliance doesn’t generally care about technology implementation,
> just risk mitigation.
> >
> >     On Mon, Apr 25, 2022 at 19:38 David Farmer <farmer=
> 40umn.edu@dmarc.ietf.org <mailto:40umn.edu@dmarc.ietf.org>> wrote:
> >
> >         I’ve asked that too and have never received an answer, I always
> get pointed requirement 1.3.7, that is it.
> >
> >         Sorry, I can’t be more helpful.
> >
> >         On Mon, Apr 25, 2022 at 18:58 Brian Carpenter <
> brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>> wrote:
> >
> >             No, I explicitly don't want to look at audit rules. I want
> someone who understands them to explain what the functional requirements
> are. NAT is not a functional requirement.
> >
> >             Regards,
> >                  Brian Carpenter
> >                  (via tiny screen & keyboard)
> >
> >             On Tue, 26 Apr 2022, 11:06 David Farmer, <farmer@umn.edu
> <mailto:farmer@umn.edu>> wrote:
> >
> >                 You want to look at PCI DSS 3.2 requirement 1.3.7.
> >                 image.png
> >
> >                 Compensating controls is an option, but auditors have to
> sign off on them, and the whole process is about minimizing exceptions and
> getting a clean audit. IT isn't in charge of this, finance people are, it's
> not technical, it's all about the money, and numbers with 7 or 8
> significant digits or more.
> >
> >                 I've been on that the merry-go-round several times, I
> believe in IPv6 E2E, but if anyone asks me just do NPTv6 or NAT66, whatever
> the auditor wants you to do.
> >
> >                 Have fun on the merry-go-round, I'll pass.
> >
> >                 Thanks
> >
> >                 On Mon, Apr 25, 2022 at 5:32 PM Brian E Carpenter <
> brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>> wrote:
> >
> >                     Kevin,
> >
> >                      > Auditing frameworks and auditors are just not
> ready for IPv6 and without migration strategies like NAT, they'll have no
> reason to be because IPv4 will continue to dominate.
> >
> >                     You're describing a vicious circle, and the question
> is how can we break it?
> >
> >                     Advocating NPTv6 might achieve that, but many of us
> dislike that strategy.
> >
> >                     Can you explain what are the technical requirements
> in PCI-DSS land that have been interpreted as requiring NAT44? Is it time
> for RFC4864bis, because this is exactly what we were aiming at with that
> RFC?
> >
> >                     Regards
> >                          Brian Carpenter
> >
> >                     On 25-Apr-22 17:34, Kevin Myers wrote:
> >                      > This misses the problem entirely though.
> >                      >
> >                      > It's not a choice to reconsider, these are
> regulatory requirements. The
> >                     fact that a handful of enterprises have deployed
> IPv6 doesn't move the needle on compliance for the vast majority of them.
> >                      >
> >                      > No retail enterprise is going to choose IPv6
> without NAT internally if it means not being permitted to use credit cards
> because of a failed PCI-DSS audit.
> >                      >
> >                      > Auditing frameworks and auditors are just not
> ready for IPv6 and without migration strategies like NAT, they'll have no
> reason to be because IPv4 will continue to dominate.
> >                      >
> >                      >
> >
>  ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >                      > *From:* Lorenzo Colitti <lorenzo@google.com
> <mailto:lorenzo@google.com>>
> >                      > *Sent:* Sunday, April 24, 2022, 11:27 PM
> >                      > *To:* Kevin Myers <kevin.myers@iparchitechs.com
> <mailto:kevin.myers@iparchitechs.com>>
> >                      > *Cc:* Brian E Carpenter <
> brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>>; Erik
> Auerswald <auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>>;
> Ted Lemon <elemon@apple.com <mailto:elemon@apple.com>>; v6ops list <
> v6ops@ietf.org <mailto:v6ops@ietf.org>>; 6man list <ipv6@ietf.org <mailto:
> ipv6@ietf.org>>
> >                      > *Subject:* Re: [v6ops] ULA precedence [Thoughts
> about wider operational
> >                     input]
> >                      >
> >                      > There are several fortune 500 companies that have
> publicly stated that they have deployed IPv6 with global addressing, so
> that's definitely possible.
> >                      >
> >                      > As for "is it better to deploy IPv6 with NAT66 or
> not to deploy at all", I would guess it depends who you ask. My personal
> answer would be no. It's possible that when faced with app and OS
> incompatibilities, those enterprises might reconsider. Or they might pick
> the same technical solutions as the enterprises that have already deployed
> with global addresses.
> >                      >
> >                      > On Mon, Apr 25, 2022 at 12:42 PM Kevin Myers <
> kevin.myers@iparchitechs.com <mailto:kevin.myers@iparchitechs.com>
> <mailto:kevin.myers@iparchitechs.com <mailto:kevin.myers@iparchitechs.com>>>
> wrote:
> >                      >
> >                      >     IPv6 NAT is already being deployed in large
> enterprises for the few
> >                     that want to tackle IPv6. Vendor implementations
> exist, so that ship has sailed regardless of where the IETF lands.
> >                      >
> >                      >     Most of the Fortune 500 fall under regulatory
> compliance of one body or another (PCI-DSS, FIPS, HIPAA,
> etc) and none of them are setup well for an IPv6 no-NAT world. Most of the
> discussion I see around enterprise adoption on the IETF lists misses this
> point. It matters very little whether NAT is a "good" or "bad" practice
> when it comes to selecting an operational model. Enterprises choose
> operational models that will pass audits
> >                     and the overwhelming majority rely heavily on NAT.
> We can make the argument that compliance bodies and auditors should update
> their guidance
> >                     and standards and they absolutely should, but it
> will probably take close
> >                     to a decade to change the regulatory compliance
> auditing landscape to the
> >                     point that IPv6 without NAT is commonplace.
> >                      >
> >                      >     If auditors won't sign off on
> end to end GUA addressing, then NAT is going to remain.
> >                      >
> >                      >     Enterprises are more than willing to punt
> IPv6 for another decade and will likely have no issues in doing so given
> how little IPv4 space most of them need compared to service providers. Even
> when IPv6 becomes the predominant transport type for an Internet handoff
> everywhere, it will still just live in the underlay while
> IPv4 remains the predominant choice in the overlay, in apps,  and
> internally in the DC for enterprises.
> >                      >
> >                      >     At what point does it become more important
> to have IPv6 implemented, than to have it "perfectly" implemented?
> >                      >
> >                      >     Kevin Myers
> >                      >     Sr. Network Architect
> >                      >     IP ArchiTechs
> >                      >
> >                      >     -----Original Message-----
> >                      >     From: v6ops <v6ops-bounces@ietf.org <mailto:
> v6ops-bounces@ietf.org> <mailto:v6ops-bounces@ietf.org <mailto:
> v6ops-bounces@ietf.org>>> On Behalf Of Brian E Carpenter
> >                      >     Sent: Sunday, April 24, 2022 9:48 PM
> >                      >     To: Lorenzo Colitti <lorenzo=
> 40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org> <mailto:
> 40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org>>>; Erik
> Auerswald <auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>
> >                     <mailto:auerswald@fg-networking.de <mailto:
> auerswald@fg-networking.de>>>; Ted Lemon <elemon@apple.com <mailto:
> elemon@apple.com> <mailto:elemon@apple.com <mailto:elemon@apple.com>>>
> >                      >     Cc: v6ops list <v6ops@ietf.org <mailto:
> v6ops@ietf.org> <mailto:v6ops@ietf.org <mailto:v6ops@ietf.org>>>; 6man
> list <ipv6@ietf.org <mailto:ipv6@ietf.org> <mailto:ipv6@ietf.org <mailto:
> ipv6@ietf.org>>>
> >                      >     Subject: Re: [v6ops] ULA precedence [Thoughts
> about wider operational input]
> >                      >
> >                      >     On 25-Apr-22 12:16, Lorenzo Colitti wrote:
> >                      >      > On Mon, Apr 25, 2022 at 2:28 AM Erik
> Auerswald <auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>
> <mailto:auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>>
> <mailto:auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>
> <mailto:auerswald@fg-networking.de <mailto:auerswald@fg-networking.de>>>>
> wrote:
> >                      >      >
> >                      >      >       "Since ULAs are defined to have a
> /48 site prefix, an implementation
> >                      >      >
> might choose to add such a row automatically on a machine with
> >                      >      >
> a ULA."
> >                      >      >
> >                      >      >     The result is that only the local ULA
> prefix,
> >                     i.e., exactly the
> >                      >      >     local IPv6 addresses, are preferred
> over IPv4
> >                     (and IPv6 GUA).
> >                      >      >     This should be exactly what is needed
> to use ULA addresses inside
> >                      >      >     an organization, or for a lab.
> >                      >      >     [...]
> >                      >      >     Implementing the non-normative
> suggestion from Section 10.6 of RFC
> >                      >      >     6724 would in all likelihood result in
> making
> >                     ULA usable for local
> >                      >      >     tests and even first steps in
> deploying IPv6.  ULA addresses would
> >                      >      >     only be
> used locally.  Existing IPv4 based Internet access would not
> >                      >      >     be impaired by adding IPv6 ULA.
> >                      >      >
> >                      >      >
> >                      >      > That does seem like it might make ULA more
> useful, yes.
> >                      >      >
> >                      >      > Additionally, maybe we could clarify that
> the longest-prefix match rule
> >                      >     does not apply to ULAs outside the same /48?
> I think that would fix
> >                     the issue observed by +Ted Lemon <mailto:
> elemon@apple.com <mailto:elemon@apple.com> <mailto:elemon@apple.com
> <mailto:elemon@apple.com>>> in home networks:
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00
> >
> >                     <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00>>
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00>
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00
> <
> https://datatracker.ietf.org/meeting/113/materials/slides-113-6man-source-address-selection-for-foreign-ulas-00>>>
> .
> >                      >
> >                      >     When two networks each with its own ULA
> prefix are intentionally merged, longest match would be the right thing,
> wouldn't it? (Assuming that
> >                     the split DNSs are also merged, and of course
> internal routing.) In that case there is no "foreign" ULA prefix.
> >                      >
> >                      >      >     In order to keep IPv6 deployment
> similar to IPv4, IPv6 NAT could be
> >                      >      >     considered.  To make this work as
> intended, the address selection
> >                      >      >     policy table could be adjusted to
> contain the
> >                     local ULA prefix
> >                      >      >     with precedence greater or equal to
> GUA and the same label as GUA.
> >                      >      >
> >                      >      >
> >                      >      > This seems like it would encourage the use
> of IPv6 NAT. I think there is reasonably strong consensus within the IETF
> that that is not the
> >                     right way to go, because it pushes problems on to
> application developers.
> >                     This adds costs for NAT traversal software
> development and maintenance, and requires devices to implement NAT
> keepalives, increasing battery usage.
> >                      >
> >                      >     That may be the IETF's consensus, but there
> is a very large fraction of the enterprise network operations community
> that strongly disagrees,
> >                     and in fact regards this as a red line issue. It
> isn't even clear that they'd accept NPTv6 as an alternative to NAPT66. If
> this is indeed the only
> >                     way to get IPv6 inside enterprises, what is the
> right thing for the IETF to do?
> >                      >
> >                      >             Brian
> >                      >
> >                      >
>  _______________________________________________
> >                      >     v6ops mailing list
> >                      > v6ops@ietf.org <mailto:v6ops@ietf.org> <mailto:
> v6ops@ietf.org <mailto:v6ops@ietf.org>>
> >                      > https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops> <
> https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops>>
> >                      >
> >                      >
> >
> >                     _______________________________________________
> >                     v6ops mailing list
> >                     v6ops@ietf.org <mailto:v6ops@ietf.org>
> >                     https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops>
> >
> >
> >
> >                 --
> >                 ===============================================
> >                 David Farmer Email:farmer@umn.edu <mailto:
> Email%3Afarmer@umn.edu>
> >                 Networking & Telecommunication Services
> >                 Office of Information Technology
> >                 University of Minnesota
> >                 2218 University Ave SE <
> https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g>
>       Phone: 612-626-0815
> >                 Minneapolis, MN 55414-3029   Cell: 612-812-9952
> >                 ===============================================
> >
> >         --
> >         ===============================================
> >         David Farmer Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu
> >
> >         Networking & Telecommunication Services
> >         Office of Information Technology
> >         University of Minnesota
> >         2218 University Ave SE <
> https://www.google.com/maps/search/2218+University+Ave+SE?entry=gmail&source=g>
>       Phone: 612-626-0815
> >         Minneapolis, MN 55414-3029   Cell: 612-812-9952
> >         ===============================================
> >         _______________________________________________
> >         v6ops mailing list
> >         v6ops@ietf.org <mailto:v6ops@ietf.org>
> >         https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops>
> >
> >     --
> >     ---
> >     Nick Buraglio
> >     Planning and Architecture
> >     Energy Sciences Network
> >     +1 (510) 995-6068
> >     _______________________________________________
> >     v6ops mailing list
> >     v6ops@ietf.org <mailto:v6ops@ietf.org>
> >     https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops>
> >
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
> >
>
>