Re: [v6ops] [IPv6] draft-ietf-6man-rfc6724-update might break current ULA+IPv4 hostnames

Nick Buraglio <buraglio@forwardingplane.net> Sun, 12 November 2023 21:40 UTC

Return-Path: <buraglio@forwardingplane.net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F442C151981 for <v6ops@ietfa.amsl.com>; Sun, 12 Nov 2023 13:40:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=forwardingplane.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sehuv0SaNLzS for <v6ops@ietfa.amsl.com>; Sun, 12 Nov 2023 13:40:13 -0800 (PST)
Received: from mail-qk1-x732.google.com (mail-qk1-x732.google.com [IPv6:2607:f8b0:4864:20::732]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB76CC151533 for <v6ops@ietf.org>; Sun, 12 Nov 2023 13:40:12 -0800 (PST)
Received: by mail-qk1-x732.google.com with SMTP id af79cd13be357-778925998cbso265992485a.0 for <v6ops@ietf.org>; Sun, 12 Nov 2023 13:40:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=forwardingplane.net; s=google; t=1699825211; x=1700430011; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Apjh7SZ+7Hu5j4P0D+gulp1jbCu7iiyI4PRz3dfT5rw=; b=jVEXVoaFfmapZWmkLks8MqeGqz8aQtsaFs6oDkN/MUDNPcwFkl4YLIxHeI7lWdh0ZN GHbUKX1oba54CJ8Rdnym0sLpwto/n1xFPGX0itZkbZIAO7HGQLRbFbO6u8l2osKm2wtl Rumox2zwWO9bJpNxKwHDGoWdBrTvHA5dNEKm4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699825211; x=1700430011; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Apjh7SZ+7Hu5j4P0D+gulp1jbCu7iiyI4PRz3dfT5rw=; b=FSDMmpTuJFZeE1WKgwshSSRzNFxH9SX95DsmQ/OH0ALEp0Vonwgg6AAQwHRwBwgKyY r1btRnn/UB+Wc52F+yJT7IAmAyHzO8x8yutLo7ATUhZR5AzLqnpxUVbkyl5mwm87Znb9 cmDjT8YJ8XYVM+f8TCfN5iS454BU3aq6aMmGFKTtjxmZYvBx4Ko7HSI+4SHd9w7zuVW7 C+s0iYYQigOlsmjqJw6fegYKASYY8mWSRjsZ/J5eY7tm6EwakHJ9H6pDkerKZxSmvhQI CRsa9PzlzAyMhBDwDlL2jebVg7AIEuVhHDgWd04orJcFQJzdZ+McIlrbXnuWomSFglFn vWQQ==
X-Gm-Message-State: AOJu0YwFyjIatZzS5niXYCrg1Isjx5nyBp+STjw0OOsTac+q1B/9dMSi KJn3Gbt/o2RjDN79kTDASgFO7lfJYQsJfFqcP+aIoQ==
X-Google-Smtp-Source: AGHT+IGTIyXxam6v8NePl/PYLLX4J5s28Byqe6XEiqmbDkSSwCWFcqdyo3bcXZ8aqvvHwektlvcAyP/YfP4mjF7WWYI=
X-Received: by 2002:ac8:59ce:0:b0:41e:1e0b:a2e7 with SMTP id f14-20020ac859ce000000b0041e1e0ba2e7mr6432852qtf.47.1699825211380; Sun, 12 Nov 2023 13:40:11 -0800 (PST)
MIME-Version: 1.0
References: <CAPt1N1mp+494DTc0hUG0ZwD34n1Kevwu3mwZKvgUq2qaTCZ6sg@mail.gmail.com> <69565BC4-B955-4840-B407-39707C47DE3E@employees.org> <CAPt1N1n_QBBdq_f0uN4=d0QKjdAoEGk4VCm-u6pMQUB0EfiCuw@mail.gmail.com> <CAO42Z2ypqtQT85iccM0N59885Zp+o+X-Lx34CjvaAf+JH9go3w@mail.gmail.com> <CAPt1N1kwJn2i6iU7shdcJBrdEn34P5aWy=k00Yf9AVKva_SbJw@mail.gmail.com> <c1e592d4-a592-ea79-0425-9f42b1fa2857@gmail.com>
In-Reply-To: <c1e592d4-a592-ea79-0425-9f42b1fa2857@gmail.com>
From: Nick Buraglio <buraglio@forwardingplane.net>
Date: Sun, 12 Nov 2023 15:40:00 -0600
Message-ID: <CACMsEX8jyWK0T+DsUpkpjdMrFVRarxWoAH=-NmA2sP_kHV8daA@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: IPv6 Ops WG <v6ops@ietf.org>, Mark Smith <markzzzsmith@gmail.com>, Ted Lemon <mellon@fugue.com>
Content-Type: multipart/alternative; boundary="000000000000e7abf20609fb659d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/peoVkwiP59anFwOSDETyzJ8oKwY>
Subject: Re: [v6ops] [IPv6] draft-ietf-6man-rfc6724-update might break current ULA+IPv4 hostnames
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Nov 2023 21:40:17 -0000

On Sun, Nov 12, 2023 at 2:39 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> On 13-Nov-23 00:38, Ted Lemon wrote:
> > I think the place to draw the line is where we make a misconfiguration
> scenario work at the expense of a scenario where there is no
> misconfiguration.
>
> I can't say this loudly enough in plain text: +1.


I agree.



>
>     Brian
>
> >
> > Op zo 12 nov 2023 om 11:19 schreef Mark Smith <markzzzsmith@gmail.com
> <mailto:markzzzsmith@gmail.com>>
> >
> >     Hi,
> >
> >     On Sun, 12 Nov 2023 at 21:55, Ted Lemon <mellon@fugue.com <mailto:
> mellon@fugue.com>> wrote:
> >      >
> >      > I agree that in this scenario, you have a problem, but I think
> the case where GUA-> GUA doesn’t work is a misconfiguration.  We shouldn’t
> try to address every possible misconfiguration because that will lead to
> useless complexity. Rather, misconfigurations should fail.
> >
> >     I generally agree with this. It's also best if the party who
> >     misconfigured something directly suffers the greatest consequences of
> >     their misconfiguration, which motivates them to fix it.
> >
> >     I think there is however some value in tolerating to an extent
> >     misconfiguration. This is Postel's "be liberal with what you accept".
> >     However, liberally accepting everything is also not good. The thing
> to
> >     think about and decide on is where to draw the line between a
> >     tolerable misconfiguration and one that should fail hard. I'd say
> >     tolerable means an acceptable end-user experience, however one that
> >     would be improved fairly significantly if the misconfiguration is
> >     fixed.
> >
> >     (More text below, have kept it all to preserve Ole's summary of my
> >     case rather than snipping it)
> >
> >      > Jen’s experience with this that she shared with us last week
> suggests that this is a better path to function than wallpapering over
> every possible problem.
> >      >
> >      > Op zo 12 nov 2023 om 10:50 schreef Ole Trøan <
> otroan@employees.org <mailto:otroan@employees.org>>
> >      >>
> >      >> Hi Ted,
> >      >>
> >      >> Mark’s case:
> >      >> Destination host B has ULA+GUA.
> >      >> Source host A has ULA+GUA also.
> >      >>
> >      >> 6724 will give two SA, DA pairs.
> >      >>
> >      >> {ULA A, ULA B}
> >      >> {GUA A, GUA B}
> >      >>
> >      >> Now, if the only path working is:
> >      >> {ULA A, GUA B}
> >      >>
> >      >> Then that SA, DA combination will not be “found” by 6724.
> >      >>
> >      >> If I understood Mark’s case correctly.
> >      >> Eg if ULA A and ULA B were in different domains.
> >
> >     No, in my scenario both of the Host A and Host B's ULA addresses were
> >     within the same network/same ULA/48 prefix.
> >
> >     Normally, Host A's ULA address should have a path through the local
> >     network to Host B's ULA address and vice versa, so Host A and B's ULA
> >     addresses should be preferred over Host A and Host B's GUA addresses.
> >
> >     However, there could be a routing fault such that H.A ULA to H.B ULA
> >     temporarily isn't working. H.A GUA to H.B. GUA would then be he fall
> >     back in that situation until the ULA routing problem is fixed.
> >
> >     Regards,
> >     Mark.
> >
> >
> >      >>
> >      >> I didn’t think HE would find other SA, DA pairs than what 6724
> gives.
> >      >>
> >      >> I am definitely not asserting anything here. But asking if this
> is also your understanding. :-)
> >      >>
> >      >> Cheers,
> >      >> Ole
> >      >>
> >      >> On 12 Nov 2023, at 11:26, Ted Lemon <mellon@fugue.com <mailto:
> mellon@fugue.com>> wrote:
> >      >>
> >      >> 
> >      >>
> >      >> Sorry, you’ll have to walk me through how happy eyeballs fails
> here.  I’m not seeing it.
> >      >>
> >      >> Op zo 12 nov 2023 om 09:00 schreef Ole Trøan <
> otroan@employees.org <mailto:otroan@employees.org>>
> >      >>>
> >      >>> Since the RFC6724 algorithm picks a single SA for a DA, in
> Mark’s example the algorithm will not find a working SA/DA at all.
> >      >>>
> >      >>> (A solution to that would be to return an ordered list of SAs
> for a DA.)
> >      >>>
> >      >>> I am not sure HE would help either, as it’s using what it gets
> from 6724.
> >      >>>
> >      >>> Did I understand that correctly?
> >      >>>
> >      >>> Cheers
> >      >>> Ole
> >      >>>
> >      >>>
> >      >>>
> >      >>> On 12 Nov 2023, at 08:31, Ted Lemon <mellon@fugue.com <mailto:
> mellon@fugue.com>> wrote:
> >      >>>
> >      >>> 
> >      >>>
> >      >>> Optimizing for weird internal network outages seems rather
> pessimistic. Do we really think this is a likely situation, such that we
> need to make sure the user doesn’t experience any delay at all in this
> case, at the risk of breaking all internal connections when we need to
> renunber the GUA?
> >      >>>
> >      >>> Op zo 12 nov 2023 om 05:14 schreef Mark Smith <
> markzzzsmith@gmail.com <mailto:markzzzsmith@gmail.com>>
> >      >>>>
> >      >>>> Hi David,
> >      >>>>
> >      >>>> On Sun, 12 Nov 2023, 13:59 David Farmer, <farmer@umn.edu
> <mailto:farmer@umn.edu>> wrote:
> >      >>>>>
> >      >>>>> Lorenzo and Mark,
> >      >>>>>
> >      >>>>> The reality is that most systems today would use IPv4 instead
> of ULA if they didn't have GUA unless they implemented the advice in
> Section 10.6 of RFC 6724, which is rare and why we need this draft.
> >      >>>>
> >      >>>>
> >      >>>> I understand completely why we need a draft to fix the problem
> with ULAs being below IPv4. Since I think of ULAs as site-locals+a random
> number, I assumed RFC 6724 just effectively replaced site-locals with ULAs,
> preferring them over GUAs, as site-locals had been.
> >      >>>>
> >      >>>>>
> >      >>>>>
> >      >>>>> We could make the advice in Section 10.6 mandatory, but RFC
> 4193 also anticipates merging ULA networks. Therefore, the advice in
> Section 10.6 needs to be mandatory and expanded to allow for an arbitrary
> number of /48s, not just the /48 covering the PIO used for ULA. I suggested
> using PIOs to add additional ULA prefixes to the policy table dynamically.
> However, others felt such a dynamic table would be too complicated and
> preferred the simplicity of raising the preference of the ULA label above
> IPv4 yet remaining below GUA in a static table.
> >      >>>>
> >      >>>>
> >      >>>> For an internal destination, that could be reached by either a
> ULA or GUA address, ULA should be preferred over GUA. Otherwise, one of the
> key benefits and uses of ULAs disappears:
> >      >>>>
> >      >>>> RFC 4193:
> >      >>>>
> >      >>>> "4.2.  Renumbering and Site Merging
> >      >>>>
> >      >>>>    The use of Local IPv6 addresses in a site results in making
> >      >>>>    communication that uses these addresses independent of
> renumbering a
> >      >>>>    site's provider-based global addresses."
> >      >>>>
> >      >>>>
> >      >>>>
> >      >>>>>
> >      >>>>> This is relatively safe as long as Happy Eyeballs is
> implemented, as HE will try ULA against IPv4 if there is no GUA. Otherwise,
> if there is GUA, HE will try it against IPv4 instead.
> >      >>>>>
> >      >>>>> As Mark points out, this still leaves GUA preferred over ULA.
> However, raising all ULA above GUA in a static table is unsafe, as any
> remote ULA would be preferred over GUA.
> >      >>>>
> >      >>>>
> >      >>>> Yes.
> >      >>>>
> >      >>>>
> >      >>>>>
> >      >>>>> Then, Happy Eyeballs would try the remote ULA against IPv4
> instead of GUA,
> >      >>>>
> >      >>>>
> >      >>>> Which is why HE should prefer ULA over GUA (and all IPv6 is
> preferred over all IPv4).
> >      >>>>
> >      >>>> Note that it needs to be Happy Eyeballs version 2, which works
> differently and better to HEv2 regarding IPv6 verses IPv4.
> >      >>>>
> >      >>>>
> >      >>>>
> >      >>>>>
> >      >>>>> with the likelihood of using IPv4 instead of GUA as
> expected.  A dynamic table that prefers known local ULAs above GUA is the
> only safe way to prefer ULA over GUA.
> >      >>>>
> >      >>>>
> >      >>>> I disagree.
> >      >>>>
> >      >>>> Hosts have to be able to cope with DNS providing unreachable
> destinations regardless of ULA/GUA/IPv4 etc. preference, because DNS isn't
> normally tightly coupled to the state of reachability of the network. (DNS
> caching would be hard if not impossible to do if DNS records were coupled
> to the state of OSPF, BGP and ultimately ND/ARP reachability for DAs.)
> >      >>>>
> >      >>>> So imagine your "safe" scenario where a host has a dynamic
> table such that the host knows of the local ULA /48.
> >      >>>>
> >      >>>> DNS returns the ULA and GUA DAs for an internal host.
> >      >>>>
> >      >>>> I think you're saying with your dynamic table that is a safe
> scenario, which I think means you're assuming then ULA will always be 100%
> available because now you're comfortable preferring ULA over GUA. (For
> completeness, does "unsafe" mean encountering long TCP connection timeout
> delays?)
> >      >>>>
> >      >>>> That may not be the case. Perhaps the ULA address of a host is
> on one network card, and the GUA address of the host is on a different
> network card (i.e. it's a multihomed host), and the link to the ULA network
> card is down. The ULA address is now unreachable, whereas the GUA is
> reachable. I think that would be an "unsafe" result in your "safe" scenario.
> >      >>>>
> >      >>>> DNS does not provide an assurance of current reachability.
> Hosts have to test reachability by actively trying to reach the DNS
> supplied DAs, and move on quickly to the next DA in the set somehow (e.g.,
> via HEv2) when the current DA is determined to be unreachable.
> >      >>>>
> >      >>>> Once you accept that DNS may return unreachable DAs, and hosts
> will and have to deal with it in a user friendly manner (HEv2 or similar),
> you then optimise for the common and likely cases (via preferences such as
> ULA over GUA), not error and uncommon cases like remote and unreachable
> ULAs in global DNS.
> >      >>>>
> >      >>>>
> >      >>>> Regards,
> >      >>>> Mark.
> >      >>>>
> >      >>>>>
> >      >>>>> Therefore, the advice in Section 10.6 is still valid and
> should be expanded to allow for an arbitrary number of /48s. With a static
> table, ULA should have a lower preference than GUA to remain safe.
> >      >>>>>
> >      >>>>> Mark's agreement, based on site-local, is valid as far as it
> goes, but since there is only one site-local prefix, there is no such thing
> as a remote site-local, where there can be unreachable remote ULAs.
> >      >>>>>
> >      >>>>> Thanks.
> >      >>>>>
> >      >>>>> On Sat, Nov 11, 2023 at 3:57 AM Lorenzo Colitti <lorenzo=
> 40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org>> wrote:
> >      >>>>>>
> >      >>>>>> Why is is a misconfiguration to put a ULA AAAA record in the
> DNS? Because it is never preferred over anything, adding it won't break
> anything, and it will work on IPv6-only networks when global IPv6
> connectivity is down. I could totally see someone doing the following:
> >      >>>>>>
> >      >>>>>> server.smallcompany.com <http://server.smallcompany.com>
> AAAA fd73:4899:2a7f:a93a::53
> >      >>>>>> server.smallcompany.com <http://server.smallcompany.com>
> AAAA 2001:db8:4923::1
> >      >>>>>> server.smallcompany.com <http://server.smallcompany.com> A
> 192.0.2.1
> >      >>>>>>
> >      >>>>>> This would work well today. The server would be reached:
> >      >>>>>>
> >      >>>>>> - over global IPv6, if the client has it
> >      >>>>>> - over ULA, if the client is v6-only and is within small
> company's network but there is no global connectivity (e.g. ISP link down
> and addresses deprecated)
> >      >>>>>> - over IPv4, otherwise
> >      >>>>>>
> >      >>>>>> People might well have done this today because it works for
> them. If we change the rules as proposed in this draft, it will stop
> working for any home network that has a ULA and IPv4, but no IPv6 (and
> there are lots of these).
> >      >>>>>>
> >      >>>>>> This is a fundamental property of ULA: it doesn't provide
> reachability. If we give all of ULA the same label, and prefer it over
> other addresses, we'll always end up with problems.
> >      >>>>>>
> >      >>>>>> What happened to the idea of treating "same /48" ULA
> differently from "rest of ULA space"?
> >      >>>>>>
> >      >>>>>> On Fri, 10 Nov 2023, 15:57 David Farmer, <farmer=
> 40umn.edu@dmarc.ietf.org <mailto:40umn.edu@dmarc.ietf.org>> wrote:
> >      >>>>>>>
> >      >>>>>>> In this scenario, a ULA source with a non-local ULA
> destination can only occur from a misconfiguration that includes both a ULA
> and Global IPv4 addresses in the Global DNS, contradicting Section 4.4 of
> RFC4193.
> >      >>>>>>>
> >      >>>>>>> Nevertheless, even if this misconfiguration happens, Happy
> Eyeballs, if implemented, will try the non-local ULA destination with the
> ULA source and the IPv4 destination and source pairings. The likely result
> is IPv4 being used in practice since the ULA source will typically fail to
> communicate with the non-local ULA destination, and IPv4 will succeed if
> IPv4 Internet connectivity is available.
> >      >>>>>>>
> >      >>>>>>> If Happy Eyeballs is not implemented, the non-local ULA
> destination with the ULA source is preferred, and the ULA source will
> typically fail to communicate with the non-local ULA destination; however,
> if the operational guidelines in Section 4.3 of [RFC4193] are followed. In
> that case, recognizing this failure can be accelerated, and transport layer
> timeouts (e.g., TCP) can be avoided. These guidelines will cause a
> Destination Unreachable ICMPv6 Error to be received by the source device,
> signaling the next address in the list to be tried, as discussed in Section
> 2 of RFC 6724;
> >      >>>>>>>
> >      >>>>>>> Well-behaved applications SHOULD NOT simply use the f
> <https://www.google.com/maps/search/D+NOT+simply+use+the+f?entry=gmail&source=g>irst
> address returned from an API such as getaddrinfo() and then give up if it
> fails. For many applications, it is appropriate to iterate through the list
> of addresses returned from getaddrinfo() until a working address is found.
> For other applications, it might be appropriate to try multiple addresses
> in parallel (e.g., with some small delay in between) and use the first one
> to succeed.
> >      >>>>>>>
> >      >>>>>>>
> >      >>>>>>> Should this also be discussed in the draft?
> >      >>>>>>>
> >      >>>>>>> Thanks
> >      >>>>>>>
> >      >>>>>>> On Fri, Nov 10, 2023 at 3:35 AM Lorenzo Colitti <lorenzo=
> 40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org>> wrote:
> >      >>>>>>>>
> >      >>>>>>>> I don't know how common this is, but it's probably worth
> thinking about.
> >      >>>>>>>>
> >      >>>>>>>> Many home routers assign ULAs, even if they don't have
> native IPv6. On such networks, a hostname that has ULA and IPv4 (or ULA and
> global and IPv4) will currently work using IPv4.
> >      >>>>>>>>
> >      >>>>>>>> If hosts update to follow the new rules in
> draft-ietf-6man-rfc6724-update, that will break because new hosts will
> prefer ULA over IPv4. This won't work, because the ULA is actually a
> different ULA and the home router will drop the packets.
> >      >>>>>>>>
> --------------------------------------------------------------------
> >      >>>>>>>> IETF IPv6 working group mailing list
> >      >>>>>>>> ipv6@ietf.org <mailto:ipv6@ietf.org>
> >      >>>>>>>> Administrative Requests:
> https://www.ietf.org/mailman/listinfo/ipv6 <
> https://www.ietf.org/mailman/listinfo/ipv6>
> >      >>>>>>>>
> --------------------------------------------------------------------
> >      >>>>>>>
> >      >>>>>>>
> >      >>>>>>>
> >      >>>>>>> --
> >      >>>>>>> ===============================================
> >      >>>>>>> David Farmer Email:farmer@umn.edu <mailto:
> Email%3Afarmer@umn.edu>
> >      >>>>>>> Networking & Telecommunication Services
> >      >>>>>>> Office of Information Technology
> >      >>>>>>> University of Minnesota
> >      >>>>>>> 2218 University Ave SE        Phone: 612-626-0815
> >      >>>>>>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> >      >>>>>>> ===============================================
> >      >>>>>
> >      >>>>>
> >      >>>>>
> >      >>>>> --
> >      >>>>> ===============================================
> >      >>>>> David Farmer Email:farmer@umn.edu <mailto:
> Email%3Afarmer@umn.edu>
> >      >>>>> Networking & Telecommunication Services
> >      >>>>> Office of Information Technology
> >      >>>>> University of Minnesota
> >      >>>>> 2218 University Ave SE        Phone: 612-626-0815
> >      >>>>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> >      >>>>> ===============================================
> >      >>>>
> >      >>>>
> --------------------------------------------------------------------
> >      >>>> IETF IPv6 working group mailing list
> >      >>>> ipv6@ietf.org <mailto:ipv6@ietf.org>
> >      >>>> Administrative Requests:
> https://www.ietf.org/mailman/listinfo/ipv6 <
> https://www.ietf.org/mailman/listinfo/ipv6>
> >      >>>>
> --------------------------------------------------------------------
> >      >>>
> >      >>>
> --------------------------------------------------------------------
> >      >>> IETF IPv6 working group mailing list
> >      >>> ipv6@ietf.org <mailto:ipv6@ietf.org>
> >      >>> Administrative Requests:
> https://www.ietf.org/mailman/listinfo/ipv6 <
> https://www.ietf.org/mailman/listinfo/ipv6>
> >      >>>
> --------------------------------------------------------------------
> >      >
> >      > _______________________________________________
> >      > v6ops mailing list
> >      > v6ops@ietf.org <mailto:v6ops@ietf.org>
> >      > https://www.ietf.org/mailman/listinfo/v6ops <
> https://www.ietf.org/mailman/listinfo/v6ops>
> >
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>