Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP, ESnet, Dell in side meeting and call for volunteers on 3 research topics
Ted Lemon <mellon@fugue.com> Sun, 06 August 2023 18:19 UTC
Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 386ECC151536 for <v6ops@ietfa.amsl.com>; Sun, 6 Aug 2023 11:19:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20221208.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OeGi17JXsKl1 for <v6ops@ietfa.amsl.com>; Sun, 6 Aug 2023 11:19:04 -0700 (PDT)
Received: from mail-qv1-xf35.google.com (mail-qv1-xf35.google.com [IPv6:2607:f8b0:4864:20::f35]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18515C15152F for <v6ops@ietf.org>; Sun, 6 Aug 2023 11:19:03 -0700 (PDT)
Received: by mail-qv1-xf35.google.com with SMTP id 6a1803df08f44-63cf69f3c22so27347236d6.3 for <v6ops@ietf.org>; Sun, 06 Aug 2023 11:19:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20221208.gappssmtp.com; s=20221208; t=1691345942; x=1691950742; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=d7RXBLi2zO2GDlO22rkG0QAB1u4uWUjw9scxVGJHfDo=; b=zWU2A+EXrVKVLp6/PQWbRf074RbmNBoOSMUV6VcrZWH1UfTry28ccD9ORxpc3z00bv KUrcjXU5qPGrt1F0HQ+zlaETp1LKwSQ3ME0UCAcJjwvUYY4fy52G92eCVvYowAQ7sq1F Y2UEDJIiGFpgSmk9yUKRX9Cp92BALK+F8vWiaq8AEan0mQafkYOD1H4x3CsFeRkSyBS9 NzYxR2ZkDepSpHp1gAW04GPaY1rmVNBbbErz09tyUhd7mEWfu+/88VzLQ3P+mhyF22FI iyTjT+TgNjAiEyhp8Wdd6Hc1BrUUz9x22tfE8ZnYO+HT1NbotTOsw+H7+21Bq7I3SNJs lP8g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691345942; x=1691950742; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=d7RXBLi2zO2GDlO22rkG0QAB1u4uWUjw9scxVGJHfDo=; b=BDxLXeMzaZ5YxszyQDPgJ6umI2Hk700tR7usMODtGcfeTuoSlQMTxS5rRSC9zgnI/r BDTYj103KrM6llxaJXyPVWg508ilg0fmxahe5fjFBZCAt/9npiSPJcgXwobNjF5JBOT4 GyeoKDHOimrPz95iBivMaqjePEDL2Tc3ldL+r/gpbfRUjgXgXV1GWfj5X72ChVDFGvOb pXcvgnzNzHfkOlUTPcDbhEdLCSBXy7/3WqBWpLZMc43IVgEh8JMpEvW9yi1vWbmQd9In KLJO3bLkjev6RwmNIwPp4GIsOQbamO3gQDaoUMX4V5/RDkhdJCRyZ1/9VPkNuPaFVDkf 6CSQ==
X-Gm-Message-State: AOJu0YwRJge7pwx/57EoOzRw5MmjQ104Ut1pBC6O/PyJXeuRX6Cd3bwD VwGIY2Pv/x5BD0tBhSGNYDSSl3YiTujmsYhiD3amRv5U+XyPcWZKyro=
X-Google-Smtp-Source: AGHT+IHQI8BdYFanVkPuWpBVd/s6j2eBcGdcES6dQy36/S75Cb5ZN1MoA6BnrSmGo9zFEHOwvoFpeaspocWf21EPeGM=
X-Received: by 2002:a0c:a719:0:b0:636:1722:8300 with SMTP id u25-20020a0ca719000000b0063617228300mr7857836qva.1.1691345942502; Sun, 06 Aug 2023 11:19:02 -0700 (PDT)
MIME-Version: 1.0
References: <fc112f43d5334e2fb307e57dd4824dd0@huawei.com> <4650D33E-D607-4426-9735-AB3717007AB6@employees.org>
In-Reply-To: <4650D33E-D607-4426-9735-AB3717007AB6@employees.org>
From: Ted Lemon <mellon@fugue.com>
Date: Sun, 06 Aug 2023 14:18:51 -0400
Message-ID: <CAPt1N1ntcgt15=MhaiNA3jiupHN15ZDBX9Ee1JjMP1a4-+=eAA@mail.gmail.com>
To: Ole Trøan <otroan=40employees.org@dmarc.ietf.org>
Cc: IPv6 Operations <v6ops@ietf.org>, Xipengxiao <xipengxiao=40huawei.com@dmarc.ietf.org>, jordi.palet@theipv6company.com
Content-Type: multipart/alternative; boundary="0000000000001879140602452a6e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/xu7VAaH2OANbgEXit_puWebKOL8>
Subject: Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP, ESnet, Dell in side meeting and call for volunteers on 3 research topics
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Aug 2023 18:19:08 -0000
As a counterpoint to this (my opinion on this is a bit orthogonal), Roman Danyliw’s discuss on draft-ietf-dnssd-srp asked why we didn’t mention an ipv4 equivalent to 7084, to which my answer was “it actually covers ipv4 adequately.” Personally I think that we should decide what to recommend if we specify IPv4aas. 8585 mentions numerous options. This doesn’t feel like something that should be in a router requirements document. I suspect we have enough operational experience at this point to make a specific recommendation; probably NAT64/464xlat. If we aren’t ready to do that, I don’t think we’re ready to include this in 7084bis. Op zo 6 aug 2023 om 12:45 schreef Ole Trøan <otroan= 40employees.org@dmarc.ietf.org> > > > > On 6 Aug 2023, at 18:02, Xipengxiao <xipengxiao= > 40huawei.com@dmarc.ietf.org> wrote: > > > > > >> > >>> I think it will be very useful to update both documents into a single > one and include other points that we discussed in the list several times > > > > I agree with Jordi that it's a good idea to merge 7084 and 8585 to have > a single requirement RFC for IPv6 CPEs, rather than having two separate > requirement RFCs, one for all IPv6 CPEs and another for IPv4-as-a-Service > CPEs. The latter can be a section in the overall document. But doing so > does require coordination with the 7084 authors. Can Tim/Gabor/Jordi > please do so? Thanks. > > I don’t think that’s a good idea. For the same reasons stated when we had > this discussion last. > IPv4aaS would belong in a IPv4 CE document. Not in an IPv6 one. > > O. > > > > > > XiPeng > > > > -----Original Message----- > > From: v6ops <v6ops-bounces@ietf.org> On Behalf Of > jordi.palet@consulintel.es > > Sent: Wednesday, August 2, 2023 10:17 PM > > To: IPv6 Operations <v6ops@ietf.org> > > Subject: Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP, > ESnet, Dell in side meeting and call for volunteers on 3 research topics > > > > When I was working in RFC8585, for long time, the intent was to update > RFC7084, and it went well at the 1st stage, but then, there was a > push-back, mainly from RFC7084 authors … so we needed to find an > alternative way. > > > > So if we now want to do that, I’m happy to go back and work on that > together with Tim, Gabor or any others. I think it will be very useful to > update both documents into a single one and include other points that we > discussed in the list several times. > > > > Regadrs, > > Jordi > > > > @jordipalet > > > > > >> El 2 ago 2023, a las 22:01, Brian E Carpenter < > brian.e.carpenter@gmail.com> escribió: > >> > >> Gábor, > >> > >> RFC 8585 is Informational, like RFC 7084, so although updates/updated > by is theoretically possible, this isn't really a bug. > >> > >> I agree that it's time to update RFC 7084, and maybe make it a BCP this > time. > >> > >> Regards > >> Brian Carpenter > >> > >>> On 03-Aug-23 04:26, Gábor LENCSE wrote: > >>> Hi Tim and Xipeng, > >>> If you plan to update (or re-issue) RFC7084 “Basic Requirements for > >>> IPv6 Customer Edge Routers”, then I recommend you to consider that, > >>> IMHO, some of its content is outdated. It mentions only 6rd (which I > >>> consider to be rather obsolete today) and DS-Lite. Since then RFC > >>> 8585 “Requirements for IPv6 Customer Edge Routers to Support > >>> IPv4-as-a-Service” has been published, but in the header of RFC 7084 > >>> a reference to RFC 8585 is missing. (It should have: "updated by RFC > >>> 8585.) Perhaps Section 4.4 "Transition Technologies Support" ( > >>> https://datatracker.ietf.org/doc/html/rfc7084#section-4.4 ) should be > >>> replaced by a pointer to RFC 8585. :-) Best regards, Gábor > >>> 8/2/2023 6:08 PM keltezéssel, Xipengxiao írta: > >>>> > >>>> Hi Tim, > >>>> > >>>> I agree that we should update RFC7084 “Basic Requirements for IPv6 > Customer Edge Routers” to advise against EUI-64. At a first thought, I > wondered whether such an update is a bit too “ad hoc” (we update it every > time we discover an issue). But at a second thought, I think the CPE > requirement RFC is an important RFC that should be kept “up to date”. > Although it’s not ideal to frequently update/publish new (requirement) > RFCs, it’s easier to update RFCs than to deal with operations issues in the > field. So if you are willing, please work with the existing authors of > 7084 to update it. thanks. > >>>> > >>>> XiPeng > >>>> > >>>> *From:* Timothy Winters <tim@qacafe.com> > >>>> *Sent:* Wednesday, August 2, 2023 2:42 PM > >>>> *To:* Xipengxiao <xipengxiao@huawei.com> > >>>> *Cc:* Ryo Yanagida <ryo@htonl.net>; v6ops@ietf.org > >>>> *Subject:* Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in side > >>>> meeting and call for volunteers on 3 research topics > >>>> > >>>> Hi XiPeng, > >>>> > >>>> I've responded inline to your questions. > >>>> > >>>> On Wed, Aug 2, 2023 at 4:12 AM Xipengxiao <xipengxiao= > 40huawei.com@dmarc.ietf.org> wrote: > >>>> > >>>> Hi Ryo, > >>>> > >>>> Thanks for providing your thought. Your question “Is BCP about IID > assignment the only thing that could be done as v6ops?” triggers me to > think that: > >>>> > >>>> 1.Can some people in v6ops work with the authors to identify (the > >>>> involved operators and) the guilty CPE models? Then something may be > >>>> done (see below) > >>>> > >>>> [twinters] - If we truly believe that EUI-64 shouldn't be used, we > should update 7084. Either via a bis, or update RFC for this issue. I'd > be happy to be an author on this draft. > >>>> > >>>> 1. > >>>> > >>>> 2.Many people in v6ops are involved in various IPv6 Councils > >>>> (e.g. of Belgium, UK). They can talk about this issue in their > >>>> countries to prevent repeat of this same mistake. They can even > >>>> talk to their regulators to issue directives > >>>> > >>>> [twinters] - IPv6 Ready Logo has a CE Router program that is used for > regulators in some areas (Brazil). One option would be to put a > requirement in about using EUI-64 on the WAN. > >>>> > >>>> 1. > >>>> > >>>> 2.Should the operators stuck with EUI-64 CPEs do NAT66 to hide > their customers’ IPv6 addresses? I know NAT is not a popular idea in IPv6, > but compared to allowing (bad) people to locate your customers’ IPv6 > addresses to the street level, maybe NAT66 is less evil? > >>>> > >>>> [twinters] - I've spoken to operators in some areas that are > investigating requiring privacy addressing on the WAN for this reason. > When it's inside the house, not connected to the ISP network it's much > harder to control, I haven't heard of any operator looking into NAT66. > >>>> > >>>> 1. > >>>> > >>>> To all - these are preliminary thoughts. I am not really > advocating them so please don’t be upset if you dislike them. I just hope > v6ops people don’t conclude too quickly that nothing can be done. To me > this is an operations issue, and it’s up to us to deal with it. > >>>> > >>>> XiPeng > >>>> > >>>> *From:* Ryo Yanagida <ryo@htonl.net> > >>>> *Sent:* Tuesday, August 1, 2023 5:01 PM > >>>> *To:* Xipengxiao <xipengxiao@huawei.com> > >>>> *Cc:* v6ops@ietf.org > >>>> *Subject:* Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in side > >>>> meeting and call for volunteers on 3 research topics > >>>> > >>>> Hi Xipeng, > >>>> > >>>> Thanks for sending this through. > >>>> > >>>> On 29 Jul 2023, at 01:15, Xipengxiao <xipengxiao= > 40huawei.com@dmarc.ietf.org> wrote: > >>>> > >>>> New report from MAPrg on Friday. Does v6ops need to do > anything? > >>>> > >>>> oWe present IPvSeeYou, a privacy attack that permits a remote > and unprivileged adversary to physically geolocate many residential IPv6 > hosts and networks with street-level precision. The crux of our method > involves: 1) remotely discovering wide area (WAN) hardware MAC addresses > from home routers; 2) correlating these MAC addresses with their WiFi BSSID > counterparts of known location; and 3) extending coverage by associating > devices connected to a common penultimate provider router. > >>>> > >>>> oWe first obtain a large corpus of MACs embedded in IPv6 > addresses via high-speed network probing. These MAC addresses are > effectively leaked up the protocol stack and largely represent WAN > interfaces of residential routers, many of which are all-in-one devices > that also provide WiFi. We develop a technique to statistically infer the > mapping between a router's WAN and WiFi MAC addresses across manufacturers > and devices, and mount a large-scale data fusion attack that correlates WAN > MACs with WiFi BSSIDs available in wardriving (geolocation) databases. > Using these correlations, we geolocate the IPv6 prefixes of >12M routers in > the wild across 146 countries and territories. Selected validation confirms > a median geolocation error of 39 meters. We then exploit technology and > deployment constraints to extend the attack to a larger set of IPv6 > residential routers by clustering and associating devices with a common > penultimate provider router. While we responsibly > >>>> disclosed our results to several manufacturers and providers, > the ossified ecosystem of deployed residential cable and DSL routers > suggests that our attack will remain a privacy threat into the foreseeable > future. > >>>> > >>>> On this particular point. If I understand this correctly, it this > is an issue with ISP/Vendor’s IID assignment in the CPEs. Is BCP about IID > assignment the only thing that could be done as v6ops? (I think there are > probably several RFCs like RFC8064 that deters the use of link-layer > address in EUI-64 generation for IIDs described in RFC4291 already) Maybe > to encourage a firmware update to change the IID assignment mechanism? > >>>> > >>>> I think the scope (and the trick) here is the existence of > all-in-one devices that have an EUI64 IID in the northbound (and also > potentially 802.11 wifi side) v6 addr. which is used here to provide a > mapping from v6 prefix to the known BSSIDs locations. > >>>> > >>>> Best, > >>>> > >>>> Ryo > >>>> > >>>> _______________________________________________ > >>>> v6ops mailing list > >>>> v6ops@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/v6ops > >>>> > >>>> > >>>> _______________________________________________ > >>>> v6ops mailing list > >>>> v6ops@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/v6ops > >>> _______________________________________________ > >>> v6ops mailing list > >>> v6ops@ietf.org > >>> https://www.ietf.org/mailman/listinfo/v6ops > >> _______________________________________________ > >> v6ops mailing list > >> v6ops@ietf.org > >> https://www.ietf.org/mailman/listinfo/v6ops > > > > > > ********************************************** > > IPv4 is over > > Are you ready for the new Internet ? > > http://www.theipv6company.com > > The IPv6 Company > > > > This electronic message contains information which may be privileged or > confidential. The information is intended to be for the exclusive use of > the individual(s) named above and further non-explicilty authorized > disclosure, copying, distribution or use of the contents of this > information, even if partially, including attached files, is strictly > prohibited and will be considered a criminal offense. If you are not the > intended recipient be aware that any disclosure, copying, distribution or > use of the contents of this information, even if partially, including > attached files, is strictly prohibited, will be considered a criminal > offense, so you must reply to the original sender to inform about this > communication and delete it. > > > > > > > > _______________________________________________ > > v6ops mailing list > > v6ops@ietf.org > > https://www.ietf.org/mailman/listinfo/v6ops > > _______________________________________________ > > v6ops mailing list > > v6ops@ietf.org > > https://www.ietf.org/mailman/listinfo/v6ops > > _______________________________________________ > v6ops mailing list > v6ops@ietf.org > https://www.ietf.org/mailman/listinfo/v6ops >
- [v6ops] Slides from AWS, SAP, ESnet, Dell in side… Xipengxiao
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … jordi.palet@consulintel.es
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Xipengxiao
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Geoff Huston
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Geoff Huston
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Geoff Huston
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Geoff Huston
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … nalini.elkins@insidethestack.com
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Ackermann, Michael
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … jordi.palet@consulintel.es
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … jordi.palet@consulintel.es
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Erik Nygren
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Vasilenko Eduard
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Vasilenko Eduard
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Kyle Ouellette
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … nalini.elkins@insidethestack.com
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … nalini.elkins@insidethestack.com
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Erik Nygren
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Vasilenko Eduard
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Vasilenko Eduard
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Ackermann, Michael
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Vasilenko Eduard
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … nalini.elkins@insidethestack.com
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Ryo Yanagida
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Lorenzo Colitti
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Xipengxiao
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Timothy Winters
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Xipengxiao
- [v6ops] Update of RFC 7084 -- Re: Slides from AWS… Gábor LENCSE
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Xipengxiao
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Brian E Carpenter
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… jordi.palet@consulintel.es
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Brian E Carpenter
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Vasilenko Eduard
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ole Trøan
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Vasilenko Eduard
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Pascal Thubert (pthubert)
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ole Trøan
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Vasilenko Eduard
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Gert Doering
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Vasilenko Eduard
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ole Trøan
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Brian E Carpenter
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Vasilenko Eduard
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Xipengxiao
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ole Trøan
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ted Lemon
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Gábor LENCSE
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Ted Lemon
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Brian E Carpenter
- Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in … Xipengxiao
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Mark Andrews
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Xipengxiao
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Timothy Winters
- [v6ops] IPv4aaS solutions -- Re: Update of RFC 70… Gabor LENCSE
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Brian E Carpenter
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… Delong.com
- Re: [v6ops] Update of RFC 7084 -- Re: Slides from… jordi.palet@consulintel.es