Re: [v6ops] [dhcwg] Fwd: New Version Notification for draft-link-dhc-v6only-01.txt

"Bernie Volz (volz)" <volz@cisco.com> Wed, 11 December 2019 11:20 UTC

Return-Path: <volz@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F5F212003E; Wed, 11 Dec 2019 03:20:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ALSGDC0q; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=RRh3M8h1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qLbOB93UIqsA; Wed, 11 Dec 2019 03:20:11 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 530EC1200E9; Wed, 11 Dec 2019 03:20:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13426; q=dns/txt; s=iport; t=1576063211; x=1577272811; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=w84SjOddIADVNbz4N0d0lnG98L5gTmBTZaqqDk5ijhE=; b=ALSGDC0qDSdhYaKVam6G57mmMrDDlA4WcGZzKwrd9msIlqukcr+dLfOj Sd+/1Y3G+2d1W2d73j9fqMs7XaT9YHhz8pMG+zqvtTl0r7v6CeZsWGQTd DvaqmRgnv/DJlJVPP094ioaw/w5EZjJP1MF7kWR99mCRMkcaHphF9wo7f w=;
IronPort-PHdr: 9a23:0fMEmReEjVRLmzoam3+Fv0wllGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwKUD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFlcejNkO2QkpAcqLE0r+eeDtaz4SF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C7AAAa0PBd/4QNJK1lGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYF+gUspJwVsWCAECyoKg3mDRgOLB4JfiVuOK4JSA1QJAQEBDAEBGAsKAgEBhEACF4FuJDgTAgMNAQEEAQEBAgEFBG2FNwELhV4BAQEBAgEBARAREQwBASwJAgEEBwQCAQgRAwEBAQECAiMDAgICHwYLFAEICAIEDgUbB4I1SwGCRgMOIAECDKFYAoE4iGF1gTKCfgEBBYE5Ag5BgxcNC4IXCYEOKIUchnwaggCBEScggkw+ghtJAQECAQEYgTEWgxAygiyNPQcogkGFeJdYL0MKgi+HJIovhCMbgkJ0hwKQCI5KiEmCF4txg2cCBAIEBQIOAQEFgWkiN4EhcBUaISoBgkEJRxEUjGYHAhqDUIUUhT90AYEnjG0BgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.69,301,1571702400"; d="scan'208";a="388153087"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Dec 2019 11:20:09 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id xBBBK9P2009223 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 11 Dec 2019 11:20:09 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 11 Dec 2019 05:20:08 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 11 Dec 2019 06:20:07 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 11 Dec 2019 06:20:07 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QtF6lQOWbUCZ/3lqOi/GNSxg8SsPpF8V8rtOr6Lw5oF2D8hCK7Z4JfX6HU8hOSW1T0hbZum9vHxicGt0yuV/61f/hVhOWkrzh660ojJAulaXe/L2nqYhFqEa3ktZXRFVL7cHx69BdIRw7zsTWLt8kgGg4c2UOY7FLnlXii4z1Zb83s/SVm2gCqbqy14Z5w9R6y6vZ4PrsEOJJo/DBh0evvLXAyjR4Ni+iENIrbIitffq/8l3Yd3lUftHtbOM2fjcAXYgOZ3Kp/K+28thUeBiDftaoXHHa0wwxMmigckryxe3BEC8DyuB1P7bMYiEFRefFcLNwIoDEy6pRDacoNCuMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w84SjOddIADVNbz4N0d0lnG98L5gTmBTZaqqDk5ijhE=; b=PLCZ/3+X5KGR+gkqoljFCFB9Hgwj6xNoBDtKZtjRjwT+ehLh0/yvok0DQvVTraRd/G7Ej6eL/k8215vwog1K/CMBnAQjK9q7Wy3mDArfULyYB++uNBQnMJLacsmWOqJXsDl92ucErQfXOvg5y1544iswFPayFi+iBlf+LDzf5o2xVdu2T23FgyY9Ae0AzpD3cYCtSV55r475yiBOpJcy90AFNsYUR8JY5+JBySbY8hvU6jJcj/E8KpN1Lw1kSA7POwvVAaOApv3tOou3I0Sob08eIBMiRQr2UtvIn76nSv6e1i6XasXs8qrv1wQjmQyYwH2KXUE54Jv+4Jz9agX9QQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w84SjOddIADVNbz4N0d0lnG98L5gTmBTZaqqDk5ijhE=; b=RRh3M8h1RoGOoVfsBTmMSAP0/4mLGGjOZbK/6gzLDSIjFhpEATgSOSKWbdmyrIDijhFlcYVElv0Q4igZmEqSNXKPTl5WyoIo+VdpAaODRG9mDCbwvy+6eQ2L7I7s+GR8J591ox7B4d4+nQsqvqgUbScFgwr+hsEHE3I6e1IBtWs=
Received: from DM6PR11MB4137.namprd11.prod.outlook.com (20.176.126.158) by DM6PR11MB3338.namprd11.prod.outlook.com (20.176.122.87) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.15; Wed, 11 Dec 2019 11:20:06 +0000
Received: from DM6PR11MB4137.namprd11.prod.outlook.com ([fe80::4194:dade:1d47:2678]) by DM6PR11MB4137.namprd11.prod.outlook.com ([fe80::4194:dade:1d47:2678%6]) with mapi id 15.20.2538.016; Wed, 11 Dec 2019 11:20:06 +0000
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
CC: Jen Linkova <furry13@gmail.com>, "dhcwg@ietf.org" <dhcwg@ietf.org>, V6 Ops List <v6ops@ietf.org>
Thread-Topic: [dhcwg] Fwd: New Version Notification for draft-link-dhc-v6only-01.txt
Thread-Index: AQHVr3RzQk/hbqRR3Uuq2dMGLakzfKe0c/9wgABW+RQ=
Date: Wed, 11 Dec 2019 11:20:06 +0000
Message-ID: <1BDB5CA6-4A86-47D7-9D12-F7D427E3F76A@cisco.com>
References: <157593507544.2098.9687007201578884820.idtracker@ietfa.amsl.com> <CABKWDgx5SSBP_K7BWxe4aPn9DKm-VPo62OXjsVZP8PRjfu0C2w@mail.gmail.com> <CAFU7BAQHkYh-EDLopUbWvw-gq8i5jttacVogKXUaJvJcBTdCOA@mail.gmail.com> <787AE7BB302AE849A7480A190F8B9330313E7F6E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <DM6PR11MB41379502CE18C7AF513181F0CF5B0@DM6PR11MB4137.namprd11.prod.outlook.com>, <787AE7BB302AE849A7480A190F8B9330313E8BE7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B9330313E8BE7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=volz@cisco.com;
x-originating-ip: [24.233.121.124]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 480f6839-cd61-4322-393c-08d77e2c1351
x-ms-traffictypediagnostic: DM6PR11MB3338:
x-microsoft-antispam-prvs: <DM6PR11MB3338E601E9DC1F4D0EE1E997CF5A0@DM6PR11MB3338.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 024847EE92
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(396003)(136003)(346002)(376002)(366004)(199004)(189003)(54164003)(13464003)(64756008)(66446008)(66556008)(71200400001)(76116006)(8676002)(91956017)(81156014)(81166006)(86362001)(66946007)(66476007)(15650500001)(54906003)(316002)(33656002)(6486002)(8936002)(186003)(6512007)(26005)(53546011)(6916009)(6506007)(2906002)(36756003)(66574012)(966005)(478600001)(5660300002)(2616005)(4326008)(19627235002)(21314003); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3338; H:DM6PR11MB4137.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: INGDeGlrRinYgYZ7wayU8By/j7Al49F3APoKK/NFWyOWfL+LeRCUqGlibU3HTrOdPslCMDarSMTzcVEzLDo919JTWP8CVeATC5lluAx1p6QEAzQmME8PkUobIPbCcM7nyc2gQacknytZjDD6oESz07GCZswxQXdHePrXIzrGnjQJOtSg2+Mc9/Qre8zjuDs2RVRrHZvWWf6ncreJrrBF95rFIZSzZGQ4d383FU7wre0gqF8Az5hVMpKYY6q1kQ9ZsfEeHK7DRaBfUq8bFN3R801qtvXvBZyQs5Zga1zUV2f+NmZA47grtnd27qzUyJgK4hKkD2BbL3ue1FXWXCffb9eJwYSRtQQV+TWLwoHFdMZPk1aPR9oPu+VRNtjmiCL5z9b4NZASFpU6RPzZsf6gp0i5XSPcBEd+VcVsE5T3+dpkWmuBHzArLwiMu/Q0PbFiinhrOLc2SunOzu692TvxlWsRXw8F3/KJSiAc0x9cJyjE4wk0prIOQRTLsI5+mTKNzMyrA8lvnel2z681pF5llJ1Sev61OjDhYvFbwMRsKqeOaKBJf3tAikiZmjFtiDCYh8L0iX8+GCYjBouFm1Gpqw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 480f6839-cd61-4322-393c-08d77e2c1351
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Dec 2019 11:20:06.3385 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8AJo0obz4M3ASRh6681z/fcVJfIJEOfsE5251OM1yhZdBKbFbRiAgFO2KiWCbNpD
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3338
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/qcQ7JFeQXCiMDKdDEUIyDv9jWu4>
Subject: Re: [v6ops] [dhcwg] Fwd: New Version Notification for draft-link-dhc-v6only-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2019 11:20:14 -0000

Not sure how this is supposed to work today (is this documented somewhere)? Is dhcp server already assigning addresses in the special range? If so, why not continue that practice and don’t honor the ipv6-only option on server.

- Bernie

> On Dec 11, 2019, at 1:28 AM, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com> wrote:
> 
> Hi Bernie, 
> 
> Please see inline. 
> 
> Cheers,
> Med
> 
>> -----Message d'origine-----
>> De : Bernie Volz (volz) [mailto:volz@cisco.com]
>> Envoyé : mardi 10 décembre 2019 17:11
>> À : BOUCADAIR Mohamed TGI/OLN; Jen Linkova; dhcwg@ietf.org
>> Cc : V6 Ops List
>> Objet : RE: [dhcwg] Fwd: New Version Notification for draft-link-dhc-
>> v6only-01.txt
>> 
>> Hi:
>> 
>> Is (8):
>> 
>>    (8) Consider returning an address from the range defined in RFC7335
>> for IPv6-only hosts. Such IPv4 addresses are required anyway for some IPv6-
>> only hosts (those with a CLAT for example).
>> 
>>    ====
>>       The result is that 192.0.0.0/29 may be used in any system
>>       that requires IPv4 addresses for backward compatibility with IPv4
>>       communications in an IPv6-only network but does not emit IPv4
>> packets
>>       "on the wire".
>>    ====
>> 
>> But RFC7335 says (in section 4):
>> 
>>   IANA has defined a well-known range, 192.0.0.0/29, in [RFC6333],
>>   which is dedicated for DS-Lite.  As defined in [RFC6333], this subnet
>>   is only present between the B4 and the Address Family Transition
>>   Router (AFTR) and never emits packets from this prefix "on the wire".
>> <---
>>   464XLAT has the same need for a non-routed IPv4 prefix, and this same
>>   need may be common for other similar solutions.  It is most prudent
>>   and effective to generalize 192.0.0.0/29 for the use of supporting
>>   IPv4 interfaces in IPv6 transition technologies rather than reserving
>>   a prefix for every possible solution.
>> 
>> So, this address is only used "on the host" (not on the wire), so why would
>> there be any need for the DHCP server to assign this address?
> 
> [Med] This is to ease remote troubleshooting of the IPv4aaS component (CLAT, B4) of the IPv6-only host. Controlling the IPv4 address configured locally allows to make use of tools such as PROBE (https://tools.ietf.org/html/rfc8335) to remotely assess the status of the IPv4aaS component via an IPv6 network.
> 
>> 
>> And as the IPv6-only option means that the host never completes the
>> DHCPDISCOVER/OFFER/REQUEST/ACK (stops at OFFER), this work could not be
>> used to assign any address.
>> 
>> - Bernie
>> 
>> -----Original Message-----
>> From: dhcwg <dhcwg-bounces@ietf.org> On Behalf Of
>> mohamed.boucadair@orange.com
>> Sent: Tuesday, December 10, 2019 5:32 AM
>> To: Jen Linkova <furry13@gmail.com>; dhcwg@ietf.org
>> Cc: V6 Ops List <v6ops@ietf.org>
>> Subject: Re: [dhcwg] Fwd: New Version Notification for draft-link-dhc-
>> v6only-01.txt
>> 
>> Hi Jen,
>> 
>> Thank you for sharing this updated version. Below some points that I do
>> think need more clarification in the I-D:
>> 
>> (1) The document is too NAT64 centric. The proposal may apply as well for
>> other IPv6-only deployment scenarios (typically, unmanaged IPv6-only CPEs
>> with IPv4aaS).
>> 
>> (2) A discussion on the benefit of this extra signal compared to relying on
>> existing signals (pref64, aftr_name, map_container...). For example, a host
>> that supports the option is ready to wait at minimum 300s and disable its
>> IPv4 configuration regardless of what is happening on the IPv6 leg. How is
>> that superior to a host delaying DHCP process by xxx ms should be explained
>> further.
>> 
>> (3) How "IPv6-only preferred" mode is supposed to be set at the host side:
>> 
>> ==
>>   A DHCP client SHOULD allow a device administrator to configure
>>   IPv6-only preferred mode either for a specific interface (to indicate
>>   that the device is IPv6-only capable if connected to a NAT64 network
>>   via that interface) or for all interfaces.
>> ==
>> 
>> * I guess the default value when the option is supported by a host is to
>> disable including it in the request. The document should include a
>> discussion on the default behavior.
>> * If an explicit action is needed from the user to enable including the
>> option, having a discussion to what extent the feature is likely to be
>> enabled would be needed.
>> 
>> (4) The document is still mixing the DHCP client vs. host behaviors. For
>> example,
>> 
>>   Clients not capable of operating in an IPv6-only NAT64 environment
>>   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>   MUST NOT include the IPv6-only Preferred option in the Parameter
>>   Request List of any DHCP packets and MUST ignore that option in
>>   packets received from DHCP servers.
>> 
>> does not make sense for a DHCP client.
>> 
>> Also, how the host is able to assess/determine that it is (not) capable to
>> behave in the IPv6 mode?
>> 
>> (5) The definition of IPv4aaS is not aligned with other RFCs: e.g., RFC8585
>> says the following:
>> 
>>   "IPv4aaS" stands for "IPv4-as-a-Service", meaning transition
>>   technologies for delivering IPv4 in IPv6-only connectivity.
>> 
>> While yours is:
>> 
>>   IPv4-as-a-Service: a deployment scenario when end hosts are expected
>>   to operate in IPv6-only mode by default and IPv4 addresses can be
>>   assigned to some hosts if those hosts explicitly opt-in to receiving
>>   IPv4 addresses.
>> 
>> (6) Do you consider a host with CLAT function as an IPv6-only host?
>> 
>> If so, the following definition should be updated to refer to "IPv4
>> connectivity" rather than "IPv4" in general. This is because an IPv4
>> address is required for CLAT for example.
>> 
>> ==
>>   IPv6-only capable host: a host which does not require IPv4 and can
>>   operate on IPv6-only networks.
>> ==
>> 
>> (7) Wouldn't the following add an extra delay for applications requiring
>> CLAT?
>> 
>> ==
>> The host MAY disable IPv4 stack
>>   completely for V6ONLY_WAIT seconds or until the network disconnection
>>   event happens.
>> ==
>> 
>> (8) Consider returning an address from the range defined in RFC7335 for
>> IPv6-only hosts. Such IPv4 addresses are required anyway for some IPv6-only
>> hosts (those with a CLAT for example).
>> 
>> ====
>>   The result is that 192.0.0.0/29 may be used in any system
>>   that requires IPv4 addresses for backward compatibility with IPv4
>>   communications in an IPv6-only network but does not emit IPv4 packets
>>   "on the wire".
>> ====
>> 
>> Cheers,
>> Med
>> 
>>> -----Message d'origine-----
>>> De : dhcwg [mailto:dhcwg-bounces@ietf.org] De la part de Jen Linkova
>>> Envoyé : mardi 10 décembre 2019 01:02 À : dhcwg@ietf.org Cc : V6 Ops
>>> List Objet : [dhcwg] Fwd: New Version Notification for
>>> draft-link-dhc-v6only- 01.txt
>>> 
>>> Hello,
>>> 
>>> Thanks to everyone for very productive centi-thread on
>>> draft-link-dhc-v6only-00 ;)
>>> Here is the improved version, -01.
>>> 
>>> The main changes:
>>> 
>>> - The option is not zero length anymore. It has 4-bytes value which
>>> might contain V6ONLY_WAIT timer. Benefits:
>>>    --- allows the network administrators to pilot the changes and
>>> rollback quickly if needed;
>>>    --- addressed some concern about an option having zero length
>>> (allegedly it might confuse some clients)
>>> 
>>> - Using a dedicated address to return to clients is now an optional
>>> optimisation. By default the server is expected just to return a
>>> random address (as usual).
>>> 
>>> - Typos fixed (probably some new typos added though).
>>> 
>>> The authors would like the DHC WG to consider adopting this document.
>>> 
>>> Thank you!
>>> 
>>> ---------- Forwarded message ---------
>>> From: <internet-drafts@ietf.org>
>>> Date: Tue, Dec 10, 2019 at 10:44 AM
>>> Subject: New Version Notification for draft-link-dhc-v6only-01.txt
>>> To: Tomek Mrugalski <tomasz.mrugalski@gmail.com>, Lorenzo Colitti
>>> <lorenzo@google.com>, Jen Linkova <furry@google.com>, Michael C.
>>> Richardson <mcr+ietf@sandelman.ca>
>>> 
>>> 
>>> 
>>> A new version of I-D, draft-link-dhc-v6only-01.txt has been
>>> successfully submitted by Jen Linkova and posted to the IETF
>>> repository.
>>> 
>>> Name:           draft-link-dhc-v6only
>>> Revision:       01
>>> Title:          IPv6-Only-Preferred Option for DHCP
>>> Document date:  2019-12-09
>>> Group:          Individual Submission
>>> Pages:          10
>>> URL:
>>> https://www.ietf.org/internet-drafts/draft-link-dhc-v6only-01.txt
>>> Status:         https://datatracker.ietf.org/doc/draft-link-dhc-v6only/
>>> Htmlized:       https://tools.ietf.org/html/draft-link-dhc-v6only-01
>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-link-dhc-
>> v6only
>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-link-dhc-v6only-
>> 01
>>> 
>>> Abstract:
>>>   This document specifies a DHCP option to indicate that a host
>>>   supports an IPv6-only mode and willing to forgo obtaining an IPv4
>>>   address if the network provides IPv6 connectivity.
>>> 
>>> 
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of
>>> submission until the htmlized version and diff are available at
>>> tools.ietf.org.
>>> 
>>> The IETF Secretariat
>>> 
>>> 
>>> --
>>> SY, Jen Linkova aka Furry
>>> 
>>> _______________________________________________
>>> dhcwg mailing list
>>> dhcwg@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dhcwg
>> 
>> _______________________________________________
>> dhcwg mailing list
>> dhcwg@ietf.org
>> https://www.ietf.org/mailman/listinfo/dhcwg