Re: [v6ops] Are we competitive?

Ted Lemon <mellon@fugue.com> Tue, 09 August 2022 18:42 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD6BAC159498 for <v6ops@ietfa.amsl.com>; Tue, 9 Aug 2022 11:42:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.904
X-Spam-Level:
X-Spam-Status: No, score=-6.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 78BOj5ed8VYM for <v6ops@ietfa.amsl.com>; Tue, 9 Aug 2022 11:42:46 -0700 (PDT)
Received: from mail-oi1-x232.google.com (mail-oi1-x232.google.com [IPv6:2607:f8b0:4864:20::232]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92E87C157B56 for <v6ops@ietf.org>; Tue, 9 Aug 2022 11:42:46 -0700 (PDT)
Received: by mail-oi1-x232.google.com with SMTP id j5so9192580oih.6 for <v6ops@ietf.org>; Tue, 09 Aug 2022 11:42:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=qJZsqrbSCV3oKcPXKexCutpODH5jlNlArxg4kpy3Qy8=; b=0iDJydixb+MCOL8iPNrIKM4KcKAmOJt20Ryd9gS9IWHgi3QkH404ufo8zyYOWMegCP P652TbXCjWVCSvDT7+gwd3P4zzOhxHMZwVZlgPGgL7t9qN0/918ppKgj45KS362UTkCH La4xOGVfEbzDAyMnjnv+0/ukGwTDNpHYh8jvKUZbo/hw01k1uA7NIDy9Bpm2idktrYic +/d2y0tmzlmCPoehP98/xqNNwxMqa33Pq18DqpgjwkV8MFVxEq4kQXkYs4MuoZq+vXGj PHyP1njzVm7/sdhFXTlppriQkiM9eVKMw2LGgLNnxvs4hftaAouThpXukqL/zaMLAMTb 43Bg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=qJZsqrbSCV3oKcPXKexCutpODH5jlNlArxg4kpy3Qy8=; b=m0HbXI8E9PNv7LEAeVF8D5eG5gEVQztB797e7cOpf5/AiHYWfLSQfE/5gS7U6T3xbd lE36KRUlyHtpMFd2yzRVko/1/FbgybeDHNtYz4dRywJZlbvaM86Kum1sPbb0CYVlfxjI 66jtqWn4o/zN3Uq7FEFCg0nYmWbwZ3fFsh03Rxr1rMg0sD8nkRYzwLV2H76+4Y4eUBF2 PBBMSL8/5Biv5OMRVPTfcpzK15Cu93Z8VeJJPzydgi1eKFFuUpthmZW9Es4F6X2gv+VB 6rhI/mLHuO3lLPJrH4UikJGMoWdwhM7c18qfFUrEXjihGyDA4sSkdztwK/OcGXR9C/U2 o6eg==
X-Gm-Message-State: ACgBeo0VJvulLbE22XkDRut9ZZBc3bng4jF+VjS15LPqj1hBuesopb+q 2YvfN8pzdG0FAH85nugLOb7QuyAxLy5+XQ26M1Axeg==
X-Google-Smtp-Source: AA6agR4Ce7BoWj1ZoWwDgpelsIUXkWaCOjmZxX6Ni98Mgm4l/WcduJBFKmqgr5v1pNg1mnY1dWwxx+FsZLFEDfW7kc8=
X-Received: by 2002:a05:6808:23d5:b0:33a:acd5:bc0c with SMTP id bq21-20020a05680823d500b0033aacd5bc0cmr10356211oib.12.1660070565343; Tue, 09 Aug 2022 11:42:45 -0700 (PDT)
MIME-Version: 1.0
References: <e4a35f0c-757a-aefa-c211-05b6015a4215@gmail.com> <YuJXbruluDmzF3RD@Space.Net> <ec68b29c62034d3e98adec9c5da45ff3@huawei.com> <25e4f9e4-e055-241c-7047-97dca8b09cc8@gmail.com> <3c35a91af90d4b82af724e7ce98378d3@huawei.com> <CAE=N4xcPq3CB5DDjPOk3oAqBfpJRebhXsFExSEAX_Yr3_XsSUg@mail.gmail.com> <97662d43-7daa-191c-792b-49a626fb9769@gmail.com> <CAM5+tA_w9n2=cXc=mgsr8iOx2rndAWgPhnoNBs4UQnJd3gJxNA@mail.gmail.com> <CADzU5g4mSqqVXE9ppe1U=dMM59GUPviArL_5tiQe0yxm-YZrgw@mail.gmail.com> <CAM5+tA9tOGuy8scXStxOTzWOwG_zvDHx4Hi5CwkGiYmzNLOvqw@mail.gmail.com>
In-Reply-To: <CAM5+tA9tOGuy8scXStxOTzWOwG_zvDHx4Hi5CwkGiYmzNLOvqw@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Tue, 09 Aug 2022 14:42:34 -0400
Message-ID: <CAPt1N1neKi_8A=WQz44vsO9nywmfCjXhiWrDMuhaFFTHvj_g7A@mail.gmail.com>
To: buraglio@es.net
Cc: Clark Gaylord <cgaylord@vt.edu>, IPv6 Operations <v6ops@ietf.org>, Xipengxiao <xipengxiao=40huawei.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005985cc05e5d34c83"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/Mx630fVEpq4twqQVziIPLp4dBqY>
Subject: Re: [v6ops] Are we competitive?
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 18:42:50 -0000

I think it would make sense to document nat66 and recommend against it
generally, describing specific situations where it is applicable, rather
than presenting it uncritically. Same with DHCPv6. We should not be
encouraging the use of DHCPv6. If people think they need it, find, but it’s
not something we should tell someone with no preference to use.

On Tue, Aug 9, 2022 at 11:57 Nick Buraglio <buraglio@es.net> wrote:

> Inline [NB] (not N.B.) =P
>
> On Mon, Aug 8, 2022 at 7:10 PM Clark Gaylord <cgaylord@vt.edu> wrote:
>
>> Similarly, I taught networking in Virginia Tech's Business Information
>> Technology program in Spring 2020, and of course IPv6 was a first class
>> citizen. I did use Kurose & Ross as the textbook, which does include some
>> IPv6, though certainly not at the level we would need, and I had to
>> supplement some material. I believe the final edition of Stevens does
>> include some IPv6 as well.
>>
>> Kurose & Ross is a good text, but frankly a little too "engineering" for
>> the audience I was reaching then or what we need here; on the other hand it
>> was far superior to Comer, which has not fared well with age and was the
>> default choice for this class. That said, I encourage anyone who isn't
>> familiar with *this* K&R :-) to check it out. One unique decision they made
>> was to work *down* the stack in successive chapters instead of up. With
>> just the IPv6 focus we're considering, this is less radical, perhaps.
>>
>> I would concur that our target should be this level: MIS/BIT students are
>> far more likely to be employed as operational IT and networking
>> professionals than Computer Science. Focusing on a trade publication that
>> could be a reasonable choice for the self-learner or as an applied textbook
>> (or at least supplemental/second text) in a networking class of this type.
>>
>
> [NB] This is mostly my experience coming from UIUC - more operational
> interest from MIS, less from CS (although there is definitely some) - but
> my data is 10 years out of date at this point.
>
>
>>
>> I've been thinking a lot about such a resource, especially (again)
>> recently; of course I thought about this a lot in 2020, but then left VT
>> etc etc. I think practical advice for "this is how you use it in
>> production" should be the focus. As such, mostly dual stack networks and
>> hosts are the norm. I do think it should include single stack: first as
>> specific hosts where you know you do not intend global Internet (e.g.
>> IPv6-only ssh bastion hosts), then how NAT64 could be used. I would
>> personally eschew DHCPv6 except for PD -- RA, SLAAC, and privacy addresses
>> are the reality on the ground, in my experience.
>>
>
> [NB] I would definitely not leave out DHCPv6. It's an important piece for
> the enterprise space, regardless of the similarity to the legacy function.
> Host configuration is almost universally one of the first 3-5 topics
> discussed, and this is always mentioned. I believe it's important to
> provide an impartial view, lay out the basics, describe a few use cases,
> etc..
>
>
>>
>> I have recently (literally today) convinced myself this text should first
>> focus on hosts that live in an environment with IPv6 (both enterprise and
>> home) and *then* a section on address planning and configuring the network.
>> This is analogous the Kurose & Ross decision to go down the stack.
>>
>> Arguably the networking section could be a second volume, but I think it
>> is easy to over do this section and hence that inclination should be
>> discouraged. It does need routing (OSPFv3, BGP) and interface templates
>> (RAs), but this isn't where we need to get into routing protocol weeds. I
>> would recommend a section on polling devices (ie netdisco, others exist too
>> but let's not belabor the matter), because I think it is *the* essential
>> asset required for security and management. But we should stay focused on
>> "this is the config you should use" (and btw here is your Cisco and Juniper
>> config snippet).
>>
>
>> Chapter One: a nice pedestrian introduction focused on the home user and
>> setting up a single stack ssh bastion at the data center. Assume data
>> center with ssh bastion on a dual stack network, and your remote network
>> (residential ISP or VPS) has IPv6 available. Go through enabling IPv6 on
>> your residential ISP router, and using this to get to your bastion, binding
>> ssh only to IPv6. Discuss how this remarkably reduces attack surface on
>> bastion.
>>
>> Chapter Two: Windows ecosystem as dual stack (primarily single stack).
>> Not so popular with the geek crowd, perhaps, but this gets immediately into
>> the "IT professional's head". If you have a dual stack route/switch network
>> and configure your AD correctly, your Windows environment will be nearly
>> 100% IPv6; I have run 100% IPv6 Windows in selected zones, but in the wild
>> you'll still have some legacy IP. This is a good exercise to demonstrate.
>>
>
> [NB] 100%. This is an absolute requirement for this to be consumable and
> useful by the vast majority of the audience.
>
>
>>
>> I'm still working on the exact outline from here, and these ideas are
>> still obviously a bit rough, but personally I'm drawing on my own
>> experience running dual and single stack systems and networks over the last
>> 20 years. Naturally, my perspective is colored by this experience, but as
>> such, it is colored by what I know works and strong use cases for using
>> IPv6, as well as the few legitimate pitfalls. NAT64 is in (admittedly a
>> stretch goal), NAT66 and ULA are out; I'm disinclined to 464XLAT (again,
>> predicated on what I do and what works today; I'm not TMobile nor is it our
>> audience - sorry I think 464 is out). And, sad to say, I think dual stack
>> by default is still in.
>>
>
> [NB] Leaving out ULA and NAT66 would be a mistake. Commercial options
> exist for NAT66, and regardless of the ideological stance, it's a
> deployment model that will happen. Similarly, not addressing ULA and some
> valid use cases (single stacked, air gapped network, etc.) and would paint
> an incomplete picture. It would also leave the reader to draw their own
> conclusions based on random other findings. I firmly believe it is better
> to control the conversation with understood facts rather than to omit
> parts. Messaging, should be impartial, and provide examples of use cases as
> well as paint a clear portrait of the caveats and cons.
>
>
>>
>> N.B. I would love to consider a dissenting opinion to my strident "don't
>> bother with DHCPv6 unless you need PD(*)" approach, but only from the
>> perspective of someone who actually runs it in comparable environments (and
>> still supports SLAAC and privacy addresses, etc).
>>
>
> [NB] We use it in production for a number of things, most importantly
> bootstrapping hosts on an IPv6-only network, it was a hard requirement.
>
>
>>
>>
>> (*) And I think *operating* PD is probably out of scope for this effort,
>> but if someone can write a short how-to section for the mom & pop ISP to
>> setup PD then it would be a worthy add. Consuming PD on your residential
>> network is clearly in.
>>
>
> [NB] That one clearly lands in SP space for me, I agree with some basic
> form of what it is, how it is used from the client perspective, and a rough
> overview of how it relates to host DHCP.
>
>>
>>
>> I'm afraid that's a bit more than $0.02 worth, sorry about that. Please
>> apply a few teaspoons of sugar if any of my opinions come off a bit tart.
>>
>> Regards
>> Clark
>>
>> On Fri, Jul 29, 2022, 13:16 Nick Buraglio <buraglio@es.net> wrote:
>>
>>> I have a few short chapters written on the process of migrating to
>>> IPv6-only. It does not cover fundamentals because I feel that it is well
>>> traveled information. It is also meant to be more of a pocket guide (i.e.
>>> short). As a potentially useless data point, at the university I was at
>>> prior to my current role, there was very little if any attention paid to
>>> operational networking in the CS department, and every student we got to do
>>> work for us in my entire tenure was largely unaware of IPv6, save for maybe
>>> one, who now works with us.
>>> I gave more guest lectures on real world networking in the MIS
>>> department than the CS department by an order of magnitude, and even then
>>> it was very entry level.
>>>
>>> nb
>>>
>>>
>>> On Thu, Jul 28, 2022 at 21:34 Brian E Carpenter <
>>> brian.e.carpenter@gmail.com> wrote:
>>>
>>>> On 29-Jul-22 10:00, Ed Horley wrote:
>>>> > I believe Rick Graziani updated IPv6 Fundamentals, Second Edition
>>>> from Cisco Press in 2017. Prior to that, Tom Coffeen's IPv6 Address
>>>> Planning book was published in 2014, and mine was published in Dec 2013 but
>>>> I would not consider Tom or my book to be one you would necessarily use in
>>>> a classroom for instruction.
>>>>
>>>> I agree. For example, consider a general introduction to networking
>>>> that you might find in a Computer Science major, which for the last many
>>>> years has been based on IPv4 as a given. OK, sometimes you'll find a
>>>> mention of IPv6. An example text book for such a course is Computer
>>>> Networking, 8th Edition, James F. Kurose and Keith Ross, Pearson. I haven't
>>>> seen that exact edition (published 2020) but the relevant bit of the
>>>> contents says:
>>>>
>>>> 4.3    The Internet Protocol (IP): IPv4, Addressing, IPv6, and More
>>>>      4.3.1    IPv4 Datagram Format
>>>>      4.3.2    IPv4 Addressing
>>>>      4.3.3    Network Address Translation (NAT)
>>>>      4.3.4    IPv6
>>>>
>>>> In other words, IPv6 is an afterthought.
>>>>
>>>> (In the 7th edition, published 2016, but still widely in use, there are
>>>> 5 pages on IPv6 following 20 pages on IPv4+NAT. Of course they look very
>>>> out of date today.)
>>>>
>>>> We want to see this:
>>>>
>>>> 4.3    The Internet Protocol (IP): IPv6, Addressing, Legacy IPv4
>>>>      4.3.1    IPv6 Datagram Format
>>>>      4.3.2    IPv6 Addressing
>>>>      4.3.3    Legacy: IPv4 and Network Address Translation (NAT)
>>>>
>>>> Get students past that stage and then the dedicated IPv6 books can come
>>>> into play.
>>>>
>>>>     Brian
>>>>
>>>> > My question would be, are you looking for a book to teach the
>>>> fundamentals of the protocol? If so, Rick's book is more than sufficient
>>>> and I would not be surprised if he will be updating it for a Third Edition.
>>>> If you are not looking for a fundamentals book but something else, what is
>>>> it you are looking for?
>>>> >
>>>> > On Thu, Jul 28, 2022 at 2:52 PM Xipengxiao <xipengxiao=
>>>> 40huawei.com@dmarc.ietf.org <mailto:40huawei.com@dmarc.ietf.org>>
>>>> wrote:
>>>> >
>>>> >     Hi Brian,
>>>>
>>>> >     Writing an IPv6 text book is a great idea!  I googled and the
>>>> newest IPv6 book was from 2014.  At that time, IPv6 deployment has just
>>>> started.  Many progresses have been made since then.  I think it’s
>>>> warranted to write a new book.   Plus, the covers of those books associated
>>>> IPv6 with snails and turtles.  It’s time to associate IPv6 with something
>>>> faster like dinosaurs J
>>>> >
>>>>
>>>> >
>>>> >     Who can better lead this effort than you, Fred, Eric Vyncke,
>>>> Fernando et al?  I am willing to contribute a fair amount of time to this
>>>> effort.  I hope other experts can contribute too.  Thanks. XiPeng
>>>> >
>>>> >     -----Original Message-----
>>>> >     From: Brian E Carpenter [mailto:brian.e.carpenter@gmail.com
>>>> <mailto:brian.e.carpenter@gmail.com>]
>>>> >     Sent: Thursday, July 28, 2022 5:05 PM
>>>> >     To: Xipengxiao <xipengxiao@huawei.com <mailto:
>>>> xipengxiao@huawei.com>>; Gert Doering <gert@space.net <mailto:
>>>> gert@space.net>>
>>>> >     Cc: IPv6 Operations <v6ops@ietf.org <mailto:v6ops@ietf.org>>
>>>> >     Subject: Re: [v6ops] Are we competitive?
>>>> >
>>>> >     Hi XiPeng,
>>>> >
>>>> >     Mainly I agree and this is a very useful summary.
>>>> >
>>>> >     However, we should question whether RFCs are the correct way
>>>> forward, rather than some kind of collaboration to produce an ideal text
>>>> book.
>>>> >
>>>> >     For example, consider the 3 volumes of "TCP/IP Illustrated" by
>>>> Stevens & Wright. I believe that had tremendous impact (published 1994, so
>>>> no IPv6).
>>>> >
>>>> >     If we go the RFC route, won't we just end up with 520 IPv6 RFCs?
>>>> >
>>>> >     Regards
>>>> >
>>>> >          Brian Carpenter
>>>> >
>>>> >
>>>> >     On 29-Jul-22 06:59, Xipengxiao wrote:
>>>> >
>>>> >      > On Thu, Jul 28, 2022 at 02:51:43PM +1200, Brian E Carpenter
>>>> wrote:
>>>> >
>>>>
>>>> >
>>>> >      >  >> Following the ongoing discussion about "IPv6-only" and why
>>>> sites are still IPv4-only, I have a question: Are we competitive?
>>>> >
>>>>
>>>> >
>>>> >      >  > [Gert] This is a valid question, which I feel hard to
>>>> answer for the general case.
>>>> >
>>>>
>>>> >
>>>> >      > Let me be blunt and say that IPv6 is not as competitive as we
>>>> want/think.  If we are to improve, we need to have a common understanding
>>>> of the current IPv6 situation, the issues and the possible solutions. Here
>>>> is my 2c for starting the discussion:
>>>> >
>>>>
>>>> >
>>>> >      > IPv6 is currently like a messy forest:
>>>> >
>>>>
>>>> >
>>>> >      > ·littered with dead trees (obsolete features/solutions),
>>>> >
>>>>
>>>> >
>>>> >      > ·smell bad (many operations & performance issues),
>>>> >
>>>>
>>>> >
>>>> >      > ·too many roads inside the forest (too many transition
>>>> solutions, too many address types), not well marked (without clear solution
>>>> guidelines), and fairly confusing
>>>> >
>>>>
>>>> >
>>>> >      > ·the roads are difficult to walk (complex address
>>>> architecture, debatable header design, many complex solutions like
>>>> source/destination address selection, ND).
>>>> >
>>>>
>>>> >
>>>> >      > This forest has 1 big advantage: plenty of O2 (addresses).
>>>> Consequently, many people avoid this forest but those really need O2 come.
>>>> A small number of “grey/white wizards” (the experts) live in the forest.
>>>> They know every tree (feature/solution) well.  But they tend to focus on
>>>> fixing individual trees than fixing the forest.
>>>> >
>>>>
>>>> >
>>>> >      > If we want to attract more residents to the forest (IPv6
>>>> adopters), it’s more important to fix the forest than to fix the trees.
>>>> Some ideas:
>>>> >
>>>>
>>>> >
>>>> >      > ·Provide better tour guide book (i.e. IPv6 solution
>>>> overviews): There are about 500 IPv6-related RFCs.  Some are obsoleted and
>>>> some are conflicting.  I think we should summarizing them and providing
>>>> guidelines, so that people can read fewer RFCs to master IPv6.  (e.g. the
>>>> ND deployment guideline draft summarizing 30+ RFCs into 1 draft)
>>>> >
>>>>
>>>> >
>>>> >      > ·Among the many possible routes (e.g. solutions), recommend
>>>> only the most popular ones (e.g. recommend only Dual-Stack, 464XLAT and
>>>> MAP-T among the 10+ transition solutions).
>>>> >
>>>>
>>>> >
>>>> >      > ·Provide better road signs in the forest (i.e. solution
>>>> guidelines): IPv6 solutions are almost complete.  Now it’s more important
>>>> to write guidelines to simplify operations than to develop more solutions.
>>>> >
>>>>
>>>> >
>>>> >      > ·Identify haphazard places in the forest, and post clear
>>>> “caution” signs (i.e. identify IPv6 operations/performance issues, and
>>>> provide guidelines/BCPs)
>>>> >
>>>>
>>>> >
>>>> >      > ·Enlist existing residents to share experience on how to
>>>> settle into this forest (i.e. case sharing from Cisco, Alibaba etc).
>>>> >
>>>>
>>>> >
>>>> >      > BTW, upon the request of an enterprise, a few on-site
>>>> attendees had a small side meeting on Monday.  Their **anonymous** opinions
>>>> and future actions are summarized in the attachment for your info.  If you
>>>> are interested to join the discussion and contribute, please voice up.
>>>> Thank you.  XiPeng
>>>> >
>>>>
>>>> >
>>>> >     ___
>>>> >     v6ops mailing list
>>>> >     v6ops@ietf.org <mailto:v6ops@ietf.org>
>>>> >     https://www.ietf.org/mailman/listinfo/v6ops <
>>>> https://www.ietf.org/mailman/listinfo/v6ops>
>>>> >
>>>> >
>>>> >
>>>> > --
>>>> > Ed Horley
>>>> > ed@hexabuild.io <mailto:ed@hexabuild.io>| (925) 876-6604
>>>> > Advancing Cloud, IoT, and Security with IPv6
>>>> > https://hexabuild.io <https://hexabuild.io/>
>>>> > And check out the IPv6 Buzz Podcast at
>>>> https://packetpushers.net/series/ipv6-buzz/ <
>>>> https://packetpushers.net/series/ipv6-buzz/>
>>>> _______________________________________________
>>>> v6ops mailing list
>>>> v6ops@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/v6ops
>>>>
>>> ᐧ
>>> _______________________________________________
>>> v6ops mailing list
>>> v6ops@ietf.org
>>> https://www.ietf.org/mailman/listinfo/v6ops
>>>
>> ᐧ
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>