Re: [v6ops] Why should IP networks be different? [DHCP Option 108 Issue with Mac and iOS devices]

Daryll Swer <contact@daryllswer.com> Sun, 24 December 2023 04:19 UTC

Return-Path: <contact@daryllswer.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98D2AC14F5FE for <v6ops@ietfa.amsl.com>; Sat, 23 Dec 2023 20:19:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=daryllswer.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MTDnXSWe3tyT for <v6ops@ietfa.amsl.com>; Sat, 23 Dec 2023 20:19:32 -0800 (PST)
Received: from mail-pj1-x1032.google.com (mail-pj1-x1032.google.com [IPv6:2607:f8b0:4864:20::1032]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 715E7C14F5E6 for <v6ops@ietf.org>; Sat, 23 Dec 2023 20:19:31 -0800 (PST)
Received: by mail-pj1-x1032.google.com with SMTP id 98e67ed59e1d1-28c4673aa30so204531a91.1 for <v6ops@ietf.org>; Sat, 23 Dec 2023 20:19:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daryllswer.com; s=google; t=1703391570; x=1703996370; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=WbXEjfaiMWPQRcnQHQAokIKNVi0Jrr1rVW8BinyEGYM=; b=MgUjCfg108rlwnD0qjPFPd+b+mT3gCjrS3zHfafzbrV8ch77/jDJcnHQQcyWmcR2FS X1cljQXx7qUOAs5GZOlrtrovQK7JQYtWSxAifZ1mY83jeHsBmysf9HCEo9FYVWry8iRk CBbdNW1JppB7KblJ79QG4WLAgpq6g8L+ZB9sB/fZ5gmvMWxX5i+TlDtUbgwNln4MNTMg T9wObF2UiDALndTrL0EhI5Fh79p2GaXC+LIO/xW91c5U9q1RO5zS/p7tSlwnu3poJAvW pnAJ3VsttynlfQw7cc5pH2zX0SBsLTZ1X39ycAB/jZlUtz5m8UGBXNQ25miMLi3fQTzL bTGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1703391570; x=1703996370; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=WbXEjfaiMWPQRcnQHQAokIKNVi0Jrr1rVW8BinyEGYM=; b=oItotUHTXRyQZcO/706b8hCK/HBkSqiozzx0zvvbmNOr+hi+GHkl+CibCfBgvS5ZEj 1WFCObmp4apZDGC7Zmh6KgCj9zd1Fb4CAfcwN/iJeCldXt7SMPpoXIwRjG0YibCbhURe gOq1hMz/KMCM7dDHVrqqPtgWyZBxWwqIV2I41fvLsymc+WyZuSRID3lwgQQ1XkEIGoZN Ucw0gnrCOni9y+cjetMkefZfoo8FFMzO0zWml5pplTsmerxeS8INivTWlc15reh9iP5k IgGoIV97ABsraijxLcOLHikgvMQu8tNGKwzPfLtxeJUnbWMpZxFtNMyo/uYOnKteAqWX KDSQ==
X-Gm-Message-State: AOJu0Yz43r1J5VjkULjOZhtJbyFLsnVEgcceCugjMkl0O5toBWPUHTcQ IUo7oE2EQ5IlmA2TYdBXsQnsJ8qbi5+HxFhRVU3FptGVELccHw==
X-Google-Smtp-Source: AGHT+IENk8tKTfKfF0gsF1GyVHQminQnDR9asXPU8GicrTlg0eGJkAymHFCKRTko9IWh38KRm/bh+g==
X-Received: by 2002:a17:90a:6bc6:b0:28b:d485:cd5d with SMTP id w64-20020a17090a6bc600b0028bd485cd5dmr5542955pjj.15.1703391570250; Sat, 23 Dec 2023 20:19:30 -0800 (PST)
Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com. [209.85.216.46]) by smtp.gmail.com with ESMTPSA id r16-20020a17090ad41000b0028b03f9107asm9729659pju.55.2023.12.23.20.19.29 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 23 Dec 2023 20:19:29 -0800 (PST)
Received: by mail-pj1-f46.google.com with SMTP id 98e67ed59e1d1-28c0df4b42eso1031038a91.1 for <v6ops@ietf.org>; Sat, 23 Dec 2023 20:19:29 -0800 (PST)
X-Received: by 2002:a17:90b:4a09:b0:28c:3042:a7c4 with SMTP id kk9-20020a17090b4a0900b0028c3042a7c4mr2046962pjb.4.1703391569521; Sat, 23 Dec 2023 20:19:29 -0800 (PST)
MIME-Version: 1.0
References: <CACyFTPHbCc00z36PRSUCsP=8Av=z4Ms0KHwk1Rxd=19TXzdyhg@mail.gmail.com> <CAPt1N1=82h05qZRqhtDirXwS1Fvz8OPt0iFRWasFHMXkEp4Fuw@mail.gmail.com> <CACyFTPFJ=CjiYbZjdF8T63a14SgeNAKaAQeTVSbAxde4J9ZfRQ@mail.gmail.com> <CAO42Z2zfzwx2NuCYZh_-ncTvmQ0T1+AsOi540RQ2BjQC0w6Kkg@mail.gmail.com> <ZYSv6CZllItMyNSQ@Space.Net> <CAO42Z2y-zKtWWJXX837RfD9XuxKaXkhg75TiEGHF=hFdnnsydQ@mail.gmail.com> <CACyFTPHDhrANP+tssS3x14Dm19TiyAYpeEF=sZdLJsrwUpAWjw@mail.gmail.com> <CAPt1N1nFk1QYmcJe4vmnj_vKp2EZ8iLipcrW3QixPKayER50LA@mail.gmail.com> <8d990f81-d4ae-b602-1f58-a0aa0fc9de28@gmail.com> <CAO42Z2wBZ3EQVtH0-EBsDhkR8owCpxTAJZJE59pVC5-jSMjUzA@mail.gmail.com> <ZYayNL9kuwH37EqP@Space.Net> <CACyFTPEn2ag2ZtgFag1N+0MqJbagw6HzYkVw0rC=0VV+DDCm+g@mail.gmail.com> <8fb2c7c5-938c-3728-17c9-85e7004883e6@gmail.com> <CACyFTPHWCCLsiUT0GEuvpq5fhnaDdD-w910x3R0wMprUGnZ9nA@mail.gmail.com> <CAO42Z2z9bFemih_0_wDa8TA1ez4zSnACF6gU5yU74rknHKCwgw@mail.gmail.com> <CACyFTPGXNyhBHV_w0Uj3QQdz3OCQ-hqtAmPNNNgUKCFGoEbxow@mail.gmail.com> <CAO42Z2yjvxkmQgBqaJtvnkLbr=J3wbwmfBRLvHf62EBL-OgoXA@mail.gmail.com>
In-Reply-To: <CAO42Z2yjvxkmQgBqaJtvnkLbr=J3wbwmfBRLvHf62EBL-OgoXA@mail.gmail.com>
From: Daryll Swer <contact@daryllswer.com>
Date: Sun, 24 Dec 2023 09:48:52 +0530
X-Gmail-Original-Message-ID: <CACyFTPFjnJySx_G43w3C6im7BRXdQxM3Q6Hj3mr-p3+fcN7TWw@mail.gmail.com>
Message-ID: <CACyFTPFjnJySx_G43w3C6im7BRXdQxM3Q6Hj3mr-p3+fcN7TWw@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>
Cc: v6ops list <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006a36d1060d39c1ad"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/gQeMjgK-rgjHPDD0xiIY20xLMHg>
Subject: Re: [v6ops] Why should IP networks be different? [DHCP Option 108 Issue with Mac and iOS devices]
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Dec 2023 04:19:37 -0000

Mark

> Reality is that you're not being objective.
The fact that you think I am the *only* person, in the market, who prefers
*stateful* addressing (whether that's DHCPv6 or something else), shows that
you have are not being objective yourself. Ground reality is,
enterprise/service providers prefer stateful addressing, whether you like
it or not. You can keep pushing for enterprise stateless-only addressing
for IPv6, and end up wondering why IPv6 adoption is snail-paced in
enterprise.

> You are ignoring existing commercial solutions to the problem you claim
to have because they don't require DHCPv6, and work with any of the IPv6
address configuration methods.
> You are resorting to non-technical criticisms ("layer 8 problems", secret
"agendas", "obsessions") because people aren't just going to accept what
you think is the only solution.
You still ignored the *fact* that Google enterprise cloud uses DHCPv6,
still ignored the storage cost issue that I keep mentioning multiple times,
still ignored the vendor-specific only solution having limitations, even
though the very same solution/blog link you shared, leads straight to the
vendor page that explicitly mentions the limitations of SLAAC/NDP based
tracking — If these points/issues are what you call “non-technical”
criticisms, then, more power to you, Mark. If this is not being subjective,
I don't know what is.

The proposal, that Ted shared, however, is far, far more viable and
potentially adoptable for enterprise, than your proposed SNMP Trap or
vendor-specific only solution(s):
https://datatracker.ietf.org/doc/html/draft-wkumari-dhc-addr-notification

*--*
Best Regards
Daryll Swer
Website: daryllswer.com
<https://mailtrack.io/link/c2062880962d6e67dd2ef3fb76ffccdcdddd4109?url=https%3A%2F%2Fwww.daryllswer.com&userId=2153471&signature=8b01294fc7693f69>


On Sun, 24 Dec 2023 at 09:30, Mark Smith <markzzzsmith@gmail.com> wrote:

>
>
> On Sun, 24 Dec 2023, 11:42 Daryll Swer, <contact@daryllswer.com> wrote:
>
>> Mark
>>
>> > State synchronisation is hard.
>> It wouldn't be so hard if DHCPv6-related improvements were allowed to
>> come to fruition in the past 10 years, should SLAAC agenda not exist.
>>
>
> There is no SLAAC "agenda".
>
> Nobody here has stopped the dhc WG working in DHCPv6 state
> synchronisation. It's not an easy problem.
>
> If you think there is a SLAAC agenda, as I am somebody who thinks SLAAC is
> a better solution to address assignment and configuration, for the
> *technical* reasons I've provided, tell me what I'm going to get out
> promoting SLAAC over DHCPv6?
>
> Nobody is paying me to have that opinion. I'm not selling any SLAAC based
> services that are making me money.
>
> Reality is that you're not being objective. You will only accept a DHCPv6
> based solution, even though it doesn't actually properly and fully solve
> the audit/security problem you claim to have.
>
> You are resorting to non-technical criticisms ("layer 8 problems", secret
> "agendas", "obsessions") because people aren't just going to accept what
> you think is the only solution. (I did it with "Big-SLAAC" cynically to
> show it's easy to do.)
>
> You are ignoring existing commercial solutions to the problem you claim to
> have because they don't require DHCPv6, and work with any of the IPv6
> address configuration methods.
>
> The best solution to a problem should satisfy the requirements is the best
> possible way, with the least drawbacks and trade offs. Best solutions is my
> agenda.
>
> That demands not being obsessive and religious about a preferred solution
> such that you ignore other better solutions.
>
> An IP-addresses-in-use solution that works with all of the methods that
> can be used to assign or configure IPv6 addresses on a host is objectively
> a better solution than one that depends on one of the IPv6 address
> assignment and configuration methods, and ignores the others ... unless of
> course you have a subjective agenda for that single IPv6 address assignment
> and configuration method.
>
>
>
>> > Another reason is fate sharing.
>> >
>> > A third reason is overhead of running a database server to allocate
>> addresses.
>> >
>> > A forth reason is running heavier weight clients to do database
>> transactions.
>> >
>> > SLAAC moves the processing and data that would be performed and stored
>> on a DHCPv6 server and distributes that per host processing and data to the
>> individual hosts.
>> >
>> > That means no requirement for a centralised database, nor any database
>> synchronisation requirements for redundancy.
>> >
>> > That means that failure of a host only affects the addressing state if
>> that host itself. Hosts don't share any addressing system fate with each
>> other or a database server.
>>
>> All trade-offs, a lot of enterprises are willing to make. Who exactly are
>> you (all the SLAAC agend-ists) to try to tell money-making businesses
>> globally, on how they should operate their business from a network
>> standpoint? The decision on the 'how' should be made by the respective
>> business as they see fit to match their technical and/or financial
>> requirements.
>>
>> SLAAC is not a one-size fits all solution. There's no such thing as a
>> “one-size fits all solution”.
>>
>> > Those are the technical benefits of a stateless address allocation
>> scheme
>> Financial benefits > technical benefits when decisions are required to be
>> made. Businesses operate on Excel sheets, not SLAAC vs DHCPv6 route count
>> in the routing table.
>>
>> Try deploying your SLAAC-based purist ideology in enterprises and “public
>> access networks” in economies like mine, let me know how it goes:
>> 1. Financially
>> 2. Technical scalability of vendor-specific implementations (also ties to
>> #1)
>> 3. All and any layer 8 overhead that comes with it
>>
>> All I see is Ivory Tower outlook-oriented arguments…
>>
>> You, apparently, missed the vendor warnings (“Problem 2”), storage cost
>> issue (“Problem 3”) and the fact that Google enterprise Cloud uses
>> DHCPv6 that I mentioned here
>> <https://mailarchive.ietf.org/arch/msg/v6ops/DFlzSXGxOldd-rK9kUz3FofLS0o/>
>> .
>>
>> *--*
>> Best Regards
>> Daryll Swer
>> Website: daryllswer.com <https://www.daryllswer.com>
>>
>>
>> On Sun, 24 Dec 2023 at 05:52, Mark Smith <markzzzsmith@gmail.com> wrote:
>>
>>>
>>>
>>> On Sun, 24 Dec 2023, 10:23 Daryll Swer, <contact=
>>> 40daryllswer.com@dmarc.ietf.org> wrote:
>>>
>>>> Brian
>>>>
>>>> Yeah, you're spot on, at least for certain economies.
>>>>
>>>> I should note that in my economy, “public access network” or “public
>>>> Wi-Fi” are required by law to take your mobile phone number and/or
>>>> government issued ID. I.e., you can't access the internet without verifying
>>>> the entered phone number through OTP or without the government issued ID.
>>>>
>>>> Now you might say, but phone numbers can be burners, not quite. Not in
>>>> my country, any more, due to various terrorist attacks from 2000s-2010s
>>>> era, that heavily relied on burner numbers to coordinate, the government
>>>> has made it virtually if not outright illegal to get a burner number.
>>>> Essentially, one cannot obtain a SIM card or e-SIM without government
>>>> issued ID, prior to 2010s era.
>>>>
>>>> This whole logging situation is complex enough as it is even with IPv4
>>>> (hello CGNAT), I don't know why the IETF insists on making it more
>>>> complicated with IPv6 with this “stateless” obsession of address
>>>> assignments.
>>>>
>>>
>>> You yourself have said at least one reason.
>>>
>>> State synchronisation is hard.
>>>
>>> Another reason is fate sharing.
>>>
>>> A third reason is overhead of running a database server to allocate
>>> addresses.
>>>
>>> A forth reason is running heavier weight clients to do database
>>> transactions.
>>>
>>> SLAAC moves the processing and data that would be performed and stored
>>> on a DHCPv6 server and distributes that per host processing and data to the
>>> individual hosts.
>>>
>>> That makes it scale.
>>>
>>> That means no requirement for a centralised database, nor any database
>>> synchronisation requirements for redundancy.
>>>
>>> That means that failure of a host only affects the addressing state if
>>> that host itself. Hosts don't share any addressing system fate with each
>>> other or a database server.
>>>
>>> Those are the technical benefits of a stateless address allocation
>>> scheme, which is why IPv4 before Ethernet had one, XNS had one, IPX had
>>> one, AppleTalk had one, CLNS had one, DecNET had one, Banyan Vines had one
>>> ...
>>>
>>> IPv4, post Ethernet, is the only layer 3 protocol that has a
>>> centralised, database driven address allocation protocol, and the origins
>>> of that can be tied to Ethernet addresses not being small enough to embed
>>> in the host portions of IPv4 addresses, unlike earlier layer 2 protocols
>>> such as BBN-1822/ARPANET and AUTODIN II.
>>>
>>> Address Mappings
>>> https://datatracker.ietf.org/doc/html/rfc796
>>>
>>>
>>> Regards,
>>> Big-SLAAC*
>>>
>>>
>>> *not affiliated with Big-Pharma
>>>
>>>
>>>
>>>> *--*
>>>> Best Regards
>>>> Daryll Swer
>>>> Website: daryllswer.com
>>>> <https://mailtrack.io/link/85f7534d570a5cdaff771e36c5c90abb833765e9?url=https%3A%2F%2Fwww.daryllswer.com&userId=2153471&signature=9badf9a5c38b04c8>
>>>>
>>>>
>>>> On Sun, 24 Dec 2023 at 02:21, Brian E Carpenter <
>>>> brian.e.carpenter@gmail.com> wrote:
>>>>
>>>>> On 24-Dec-23 02:58, Daryll Swer wrote:
>>>>> >  > I find it truly amazing how much energy is invested in approaches
>>>>> to work around the shortcomings of SLAAC, just because "DHCPv6 does not fit
>>>>> the architecture". Maybe the architecture is just... bad?  And this is one
>>>>> of the reasons
>>>>> >
>>>>> > It looks like we'll need to wait for law enforcement pressure to
>>>>> start piling up on IPv6-origin cybercrimes.
>>>>>
>>>>> I think there's a general failure to recognize that corporate networks
>>>>> and public-access networks are deeply different in this respect. (That
>>>>> dichotomy is over-simplified, but never mind for now.)
>>>>>
>>>>> If a bad actor drops into a public-access network, commits their
>>>>> crime, and goes away, any logging that the network has done is pretty
>>>>> useless - somebody with a variable MAC address appeared, grabbed an IP
>>>>> address for half an hour, and then vanished; that MAC address will never be
>>>>> seen again, the IP addresses might serve to identify the geographical
>>>>> location (modulo VPN usage), but the forensic evidence is pretty much
>>>>> useless. So SLAAC is fine for everybody; there's nothing to be gained from
>>>>> DHCP. (Alternatively, you can describe exactly the same scenario as
>>>>> protecting the privacy and civil rights of the person.)
>>>>>
>>>>> On a corporate network whose operator has financial, civil and
>>>>> criminal liability to consider, this is completely unacceptable. As Daryll
>>>>> pointed out, it's the "stateless" in SLAAC that's the problem.
>>>>>
>>>>> Two scenarios, two solutions.
>>>>>
>>>>>      Brian
>>>>>
>>>>>
>>>>> > When that happens, it'll put pressure on these enterprises, the
>>>>> enterprises will put pressure on the vendors, the vendors will come to
>>>>> these IETF mailing lists. Perhaps then, will the SLAAC agend-ists get off
>>>>> their Ivory Towers, come down to the ground reality and patch DHCPv6
>>>>> related issues or derive a completely new protocol/standard for stateful
>>>>> IPv6.
>>>>> >
>>>>> > As of now, even some recent big profile crimes done by ATPs, were
>>>>> funnily enough, largely, IPv4-only (from the attacker's side). But, nothing
>>>>> lasts forever, only a matter of time before the criminals learn IPv6,
>>>>> probably use SLAAC to their advantage if anything.
>>>>> >
>>>>> > *--*
>>>>> > Best Regards
>>>>> > Daryll Swer
>>>>> > Website: daryllswer.com <
>>>>> https://mailtrack.io/link/b50e45b18766146001d8eb00efbd0f9b7e027202?url=https%3A%2F%2Fwww.daryllswer.com&userId=2153471&signature=1d0a6ca56ace57cf
>>>>> >
>>>>> >
>>>>> >
>>>>> > On Sat, 23 Dec 2023 at 15:41, Gert Doering <gert@space.net <mailto:
>>>>> gert@space.net>> wrote:
>>>>> >
>>>>> >     Hi,
>>>>> >
>>>>> >     On Sat, Dec 23, 2023 at 01:29:12PM +1100, Mark Smith wrote:
>>>>> >      > Routers could report ND cache entry creation via SNMP traps
>>>>> etc.
>>>>> >
>>>>> >     Note the "could" here.  Some might actually do, most don't.
>>>>> >
>>>>> >     Is there an RFC that requires router vendors to do that?
>>>>> >
>>>>> >      > SAVI validates IPv6 addresses assigned through multiple
>>>>> mechanisms, so
>>>>> >      > naturally it would be possible to add reporting of SAVI
>>>>> events to
>>>>> >      > implementations.
>>>>> >      >
>>>>> >      > RFC 8074, "Source Address Validation Improvement (SAVI) for
>>>>> Mixed
>>>>> >      > Address Assignment Methods Scenario".
>>>>> >
>>>>> >     Any vendor actually implementing this?
>>>>> >
>>>>> >     I find it truly amazing how much energy is invested in
>>>>> approaches to
>>>>> >     work around the shortcomings of SLAAC, just because "DHCPv6 does
>>>>> not
>>>>> >     fit the architecture".
>>>>> >
>>>>> >     Maybe the architecture is just... bad?  And this is one of the
>>>>> reasons
>>>>> >     why people do not adopt IPv6 in a timely fashion?
>>>>> >
>>>>> >     Gert Doering
>>>>> >              -- NetMaster
>>>>> >     --
>>>>> >     have you enabled IPv6 on something today...?
>>>>> >
>>>>> >     SpaceNet AG                      Vorstand: Sebastian v. Bomhard,
>>>>> Michael Emmer
>>>>> >     Joseph-Dollinger-Bogen 14        Aufsichtsratsvors.: A.
>>>>> Grundner-Culemann
>>>>> >     D-80807 Muenchen                 HRB: 136055 (AG Muenchen)
>>>>> >     Tel: +49 (0)89/32356-444         USt-IdNr.: DE813185279
>>>>> >
>>>>> >     _______________________________________________
>>>>> >     v6ops mailing list
>>>>> >     v6ops@ietf.org <mailto:v6ops@ietf.org>
>>>>> >     https://www.ietf.org/mailman/listinfo/v6ops <
>>>>> https://www.ietf.org/mailman/listinfo/v6ops>
>>>>> >
>>>>> >
>>>>> > _______________________________________________
>>>>> > v6ops mailing list
>>>>> > v6ops@ietf.org
>>>>> > https://www.ietf.org/mailman/listinfo/v6ops
>>>>>
>>>> _______________________________________________
>>>> v6ops mailing list
>>>> v6ops@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/v6ops
>>>>
>>>