[Users] Guest to guest multicast

Hi, I'm trying to use the VRRP protocol between two VMs, but the multicast traffic never gets through. On the oVirt host I can see the VRRP advertisements coming in for both VMs: aio:~# tcpdump -n -X -i vnet3 net 224.0.0.0/4 listening on vnet3, link-type EN10MB (Ethernet), capture size 65535 bytes 18:58:31.841220 IP 10.1.2.3 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 0, authtype none, intvl 1s, length 36 aio:~# tcpdump -n -X -i vnet8 net 224.0.0.0/4 listening on vnet8, link-type EN10MB (Ethernet), capture size 65535 bytes 19:02:26.907054 IP 10.1.2.4 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 100, authtype none, intvl 1s, length 36 What is required to enable guest-to-guest multicast communication on an oVirt node? Thanks - Frank

Hi, ----- Original Message -----
From: "Frank Wall" <fw@moov.de> To: users@ovirt.org Sent: Friday, September 6, 2013 8:05:21 PM Subject: [Users] Guest to guest multicast
Hi,
I'm trying to use the VRRP protocol between two VMs, but the multicast traffic never gets through. On the oVirt host I can see the VRRP advertisements coming in for both VMs:
aio:~# tcpdump -n -X -i vnet3 net 224.0.0.0/4 listening on vnet3, link-type EN10MB (Ethernet), capture size 65535 bytes 18:58:31.841220 IP 10.1.2.3 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 0, authtype none, intvl 1s, length 36
aio:~# tcpdump -n -X -i vnet8 net 224.0.0.0/4 listening on vnet8, link-type EN10MB (Ethernet), capture size 65535 bytes 19:02:26.907054 IP 10.1.2.4 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 100, authtype none, intvl 1s, length 36
What is required to enable guest-to-guest multicast communication on an oVirt node?
Are they on the same virtual network/bridge? Did you check iptables? You can add a rule to log such things and see if it was iptables that blocked it (or something else). Check both host and VMs. -- Didi

Hi Yedidyah, On 17.09.2013 09:32, Yedidyah Bar David wrote:
What is required to enable guest-to-guest multicast communication on an oVirt node?
Are they on the same virtual network/bridge? Did you check iptables? You can add a rule to log such things and see if it was iptables that blocked it (or something else). Check both host and VMs.
yes, both guest interfaces are on the same virtual bridge: mytestlan 8000.8000.000000000111 no dummy_3 vnet11 vnet13 On the host side iptables is configured to log rejected packets: -A INPUT -j LOG -m limit --limit 2/min --log-prefix "REJECT: " --log-level 4 But I've never seen any log message related to multicast traffic while debugging this issue. Thanks - Frank

Hi, I've tested a multicast traffic between VMs which worked fine to me. The test made between two VMs running on different hosts, connected to the same switch. The only pitfall i encountered was the firewall which blocked the traffic. Once disabled, I was able to complete the test (used iperf). Regards, Moti ----- Original Message -----
From: "Frank Wall" <fw@moov.de> To: users@ovirt.org Sent: Friday, September 6, 2013 8:05:21 PM Subject: [Users] Guest to guest multicast
Hi,
I'm trying to use the VRRP protocol between two VMs, but the multicast traffic never gets through. On the oVirt host I can see the VRRP advertisements coming in for both VMs:
aio:~# tcpdump -n -X -i vnet3 net 224.0.0.0/4 listening on vnet3, link-type EN10MB (Ethernet), capture size 65535 bytes 18:58:31.841220 IP 10.1.2.3 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 0, authtype none, intvl 1s, length 36
aio:~# tcpdump -n -X -i vnet8 net 224.0.0.0/4 listening on vnet8, link-type EN10MB (Ethernet), capture size 65535 bytes 19:02:26.907054 IP 10.1.2.4 > 224.0.0.18: VRRPv2, Advertisement, vrid 1, prio 100, authtype none, intvl 1s, length 36
What is required to enable guest-to-guest multicast communication on an oVirt node?
Thanks - Frank _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users

Hi Moti, On 17.09.2013 15:41, Moti Asayag wrote:
I've tested a multicast traffic between VMs which worked fine to me. The test made between two VMs running on different hosts, connected to the same switch.
would you please provide some details about how you tested the multicast traffic between VMs? I would be interested in doing the exact same tests on my side, i.e. running the same commands. (Note that in my test setup all VMs run on the same host.) Thanks - Frank

On 17.09.2013 15:41, Moti Asayag wrote:
I've tested a multicast traffic between VMs which worked fine to me. The test made between two VMs running on different hosts, connected to the same switch.
OK, I found a secure way to test multicast communication: (see http://www.linuxproblems.org/wiki/How_to_check_Multicasting) # VM_A: start the receiver VM_A# java -cp jgroups-3.3.3.Final.jar org.jgroups.tests.McastReceiverTest -mcast_addr 231.12.21.132 -port 45566 Socket=0.0.0.0/0.0.0.0:45566, bind interface=/127.0.0.1 Socket=0.0.0.0/0.0.0.0:45566, bind interface=/10.1.2.3 # VM_B: start the sender, send message "test" VM_B# java -cp jgroups-3.3.3.Final.jar org.jgroups.tests.McastSenderTest -mcast_addr 231.12.21.132 -port 45566 Socket #1=0.0.0.0/0.0.0.0:45566, ttl=32, bind interface=/127.0.0.1 Socket #2=0.0.0.0/0.0.0.0:45566, ttl=32, bind interface=/10.1.2.4
test
# VM_A will receive the message test [sender=10.1.2.4:45566] So this basically means that multicast is working. For some reason, VRRP/CARP is NOT working. This means pfSense HA and *BSD (u)CARP is not usable right now. Any hint? I'm out of ideas right now. Thanks - Frank

----- Original Message -----
From: "Frank Wall" <fw@moov.de> To: "Moti Asayag" <masayag@redhat.com> Cc: users@ovirt.org Sent: Wednesday, October 16, 2013 2:33:11 PM Subject: Re: [Users] Guest to guest multicast
Hi Moti,
On 17.09.2013 15:41, Moti Asayag wrote:
I've tested a multicast traffic between VMs which worked fine to me. The test made between two VMs running on different hosts, connected to the same switch.
would you please provide some details about how you tested the multicast traffic between VMs? I would be interested in doing the exact same tests on my side, i.e. running the same commands. (Note that in my test setup all VMs run on the same host.)
I used iperf for testing multicast between the vms. See http://iperf.fr/#multicast for the exact commands.
Thanks - Frank

Hi Moti, On 17.10.2013 08:04, Moti Asayag wrote:
I used iperf for testing multicast between the vms. See http://iperf.fr/#multicast for the exact commands.
thanks, I did a quick test with iperf with a good result (445 out of 446 datagrams could be received). But still pfSense/FreeBSD CARP/uCARP does not work, it seems to be filtered on the oVirt/KVM Host. Have you ever heard of this? Any idea? Thanks - Frank

----- Original Message -----
From: "Frank Wall" <fw@moov.de> To: "Moti Asayag" <masayag@redhat.com> Cc: users@ovirt.org Sent: Thursday, October 17, 2013 2:12:35 PM Subject: Re: [Users] Guest to guest multicast
Hi Moti,
On 17.10.2013 08:04, Moti Asayag wrote:
I used iperf for testing multicast between the vms. See http://iperf.fr/#multicast for the exact commands.
thanks, I did a quick test with iperf with a good result (445 out of 446 datagrams could be received). But still pfSense/FreeBSD CARP/uCARP does not work, it seems to be filtered on the oVirt/KVM Host. Have you ever heard of this? Any idea?
On ovirt 3.2 we introduced the network-filters feature [1] which prevents guests from spoofing other mac-addresses than these which assigned by the engine. The feature is enable by default since introduced (for 3.2 and above) There is a possibility that the implementation of the VRRP modifies the mac address to the expected addresses which be ended in libvirt's filtering (using the ebtables) the frames. Could you try disabling the filter, restart the vms and re-run the test ? 1. On the ovirt-engine run: engine-config -s EnableMACAntiSpoofingFilterRules=false --cver=3.3 (if you're using ovirt-engine 3.2, make sure to specify it in the --cver= option). 2. Restart the ovirt-engine service 3. Restart the vms 4. Re-run the test An alternative might be to use the custom mac address for the vms which serves as routers to start with 00-00-5E-00-01-XX (as long as the mac address will not be replaced by the protocol) [1] http://www.ovirt.org/Features/Design/Network/NetworkFiltering [2]
Thanks - Frank

Hi Moti, On 17.10.2013 15:08, Moti Asayag wrote:
Could you try disabling the filter, restart the vms and re-run the test ? 1. On the ovirt-engine run: engine-config -s EnableMACAntiSpoofingFilterRules=false --cver=3.3 (if you're using ovirt-engine 3.2, make sure to specify it in the --cver= option). 2. Restart the ovirt-engine service 3. Restart the vms 4. Re-run the test
YES! This solved the VRRP problem. THANK YOU! At some point I was already suspecting that ebtables and the Anti-Spoofing rules would be causing my problem, because I could see them in the XML configuration of my VMs, but a "ebtables -L" did not show any rule. So I kept on searching... My question is: How would I find these Anti-Spoofing rules that oVirt applies to each VM? Just want to find out at which point my debugging went into the wrong direction ;-) Thanks - Frank

----- Original Message -----
From: "Frank Wall" <fw@moov.de> To: "Moti Asayag" <masayag@redhat.com> Cc: users@ovirt.org Sent: Thursday, October 17, 2013 4:33:51 PM Subject: Re: [Users] Guest to guest multicast
Hi Moti,
On 17.10.2013 15:08, Moti Asayag wrote:
Could you try disabling the filter, restart the vms and re-run the test ? 1. On the ovirt-engine run: engine-config -s EnableMACAntiSpoofingFilterRules=false --cver=3.3 (if you're using ovirt-engine 3.2, make sure to specify it in the --cver= option). 2. Restart the ovirt-engine service 3. Restart the vms 4. Re-run the test
YES! This solved the VRRP problem. THANK YOU!
At some point I was already suspecting that ebtables and the Anti-Spoofing rules would be causing my problem, because I could see them in the XML configuration of my VMs, but a "ebtables -L" did not show any rule. So I kept on searching...
you should have specify the 'nat' table name and then you'd see the entire rules: ebtables -t nat -L
My question is: How would I find these Anti-Spoofing rules that oVirt applies to each VM? Just want to find out at which point my debugging went into the wrong direction ;-)
ovirt applies the same rules for all of the vm. A custom nwfilter rule named 'vdsm-no-mac-spoofing' is being created by vdsm when it starts. To see it contents requires using 'virsh' on the node: virsh -r nwfilter-dumpxml vdsm-no-mac-spoofing <uuid>c05471a7-9dee-6021-32e3-5d70e7617fc5</uuid> <filterref filter='no-mac-spoofing'/> <filterref filter='no-arp-mac-spoofing'/> </filter> where the 2 rules are predefined by libvirt's nwfilter.
Thanks - Frank

--_000_5F9E965F5A80BC468BE5F40576769F0948D549FFexchange21_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 dG9yIDIwMTMtMTAtMTcga2xvY2thbiAxMzoxMiArMDIwMCBza3JldiBGcmFuayBXYWxsOg0KDQoN CkhpIE1vdGksDQoNCk9uIDE3LjEwLjIwMTMgMDg6MDQsIE1vdGkgQXNheWFnIHdyb3RlOg0KPiBJ IHVzZWQgaXBlcmYgZm9yIHRlc3RpbmcgbXVsdGljYXN0IGJldHdlZW4gdGhlIHZtcy4gU2VlDQo+ IGh0dHA6Ly9pcGVyZi5mci8jbXVsdGljYXN0DQo+IGZvciB0aGUgZXhhY3QgY29tbWFuZHMuDQoN CnRoYW5rcywgSSBkaWQgYSBxdWljayB0ZXN0IHdpdGggaXBlcmYgd2l0aCBhIGdvb2QgcmVzdWx0 ICg0NDUgb3V0IG9mIDQ0Ng0KZGF0YWdyYW1zIGNvdWxkIGJlIHJlY2VpdmVkKS4gQnV0IHN0aWxs IHBmU2Vuc2UvRnJlZUJTRCBDQVJQL3VDQVJQIGRvZXMNCm5vdCB3b3JrLCBpdCBzZWVtcyB0byBi ZSBmaWx0ZXJlZCBvbiB0aGUgb1ZpcnQvS1ZNIEhvc3QuIEhhdmUgeW91IGV2ZXINCmhlYXJkIG9m IHRoaXM/IEFueSBpZGVhPw0KDQoNCkRpZG7CtHQgdGhpbmsgb2YgaXQgZmlyc3QgYnV0IEnCtHZl IGFjdHVhbGx5IHNldCB1cCBWTSdzIGFzICJjbHVzdGVyIiB3aXRoIENBUlAgYW5kIEZyZWVCU0Qs IGFuZCBpdCB3b3JrZWQgZmxhd2xlc3NseSBmb3IgbWUgKFRNKS4gScK0bSBydW5uaW5nIG9WaXJ0 LTMuMiwgaWYgdGhhdCBpcyBvZiBpbnRlcmVzdC4NCg0KDQoNCg0KDQoNClRoYW5rcw0KLSBGcmFu aw0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NClVzZXJz IG1haWxpbmcgbGlzdA0KVXNlcnNAb3ZpcnQub3JnPG1haWx0bzpVc2Vyc0BvdmlydC5vcmc+DQpo dHRwOi8vbGlzdHMub3ZpcnQub3JnL21haWxtYW4vbGlzdGluZm8vdXNlcnMNCg0KDQotLQ0KDQpN ZWQgVsOkbmxpZ2EgSMOkbHNuaW5nYXINCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCkthcmxpIFNq w7ZiZXJnDQpTd2VkaXNoIFVuaXZlcnNpdHkgb2YgQWdyaWN1bHR1cmFsIFNjaWVuY2VzDQpCb3gg NzA3OSAoVmlzaXRpbmcgQWRkcmVzcyBLcm9uw6VzdsOkZ2VuIDgpDQpTLTc1MCAwNyBVcHBzYWxh LCBTd2VkZW4NClBob25lOiAgKzQ2LSgwKTE4LTY3IDE1IDY2DQprYXJsaS5zam9iZXJnQHNsdS5z ZTxtYWlsdG86a2FybGkuc2pvYmVyZ0BhZG0uc2x1LnNlPg0K --_000_5F9E965F5A80BC468BE5F40576769F0948D549FFexchange21_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PCFET0NUWVBFIEhUTUwgUFVCTElDICItLy9XM0MvL0RURCBIVE1MIDQuMCBUUkFOU0lUSU9OQUwv L0VOIj4NCjxodG1sPg0KPGhlYWQ+DQo8bWV0YSBodHRwLWVxdWl2PSJDb250ZW50LVR5cGUiIGNv bnRlbnQ9InRleHQvaHRtbDsgY2hhcnNldD11dGYtOCI+DQo8bWV0YSBuYW1lPSJHRU5FUkFUT1Ii IGNvbnRlbnQ9Ikd0a0hUTUwvNC42LjQiPg0KPC9oZWFkPg0KPGJvZHk+DQp0b3IgMjAxMy0xMC0x NyBrbG9ja2FuIDEzOjEyICYjNDM7MDIwMCBza3JldiBGcmFuayBXYWxsOg0KPGJsb2NrcXVvdGUg dHlwZT0iQ0lURSI+DQo8cHJlPgpIaSBNb3RpLAoKT24gMTcuMTAuMjAxMyAwODowNCwgTW90aSBB c2F5YWcgd3JvdGU6Cjxmb250IGNvbG9yPSIjNzM3MzczIj4mZ3Q7IEkgdXNlZCBpcGVyZiBmb3Ig dGVzdGluZyBtdWx0aWNhc3QgYmV0d2VlbiB0aGUgdm1zLiBTZWU8L2ZvbnQ+Cjxmb250IGNvbG9y PSIjNzM3MzczIj4mZ3Q7IDxhIGhyZWY9Imh0dHA6Ly9pcGVyZi5mci8jbXVsdGljYXN0Ij5odHRw Oi8vaXBlcmYuZnIvI211bHRpY2FzdDwvYT48L2ZvbnQ+Cjxmb250IGNvbG9yPSIjNzM3MzczIj4m Z3Q7IGZvciB0aGUgZXhhY3QgY29tbWFuZHMuPC9mb250PgoKdGhhbmtzLCBJIGRpZCBhIHF1aWNr IHRlc3Qgd2l0aCBpcGVyZiB3aXRoIGEgZ29vZCByZXN1bHQgKDQ0NSBvdXQgb2YgNDQ2IApkYXRh Z3JhbXMgY291bGQgYmUgcmVjZWl2ZWQpLiBCdXQgc3RpbGwgcGZTZW5zZS9GcmVlQlNEIENBUlAv dUNBUlAgZG9lcyAKbm90IHdvcmssIGl0IHNlZW1zIHRvIGJlIGZpbHRlcmVkIG9uIHRoZSBvVmly dC9LVk0gSG9zdC4gSGF2ZSB5b3UgZXZlciAKaGVhcmQgb2YgdGhpcz8gQW55IGlkZWE/CjwvcHJl Pg0KPC9ibG9ja3F1b3RlPg0KPGJyPg0KRGlkbsK0dCB0aGluayBvZiBpdCBmaXJzdCBidXQgScK0 dmUgYWN0dWFsbHkgc2V0IHVwIFZNJ3MgYXMgJnF1b3Q7Y2x1c3RlciZxdW90OyB3aXRoIENBUlAg YW5kIEZyZWVCU0QsIGFuZCBpdCB3b3JrZWQgZmxhd2xlc3NseSBmb3IgbWUgKFRNKS4gScK0bSBy dW5uaW5nIG9WaXJ0LTMuMiwgaWYgdGhhdCBpcyBvZiBpbnRlcmVzdC48YnI+DQo8YnI+DQo8Ymxv Y2txdW90ZSB0eXBlPSJDSVRFIj4NCjxwcmU+CgoKClRoYW5rcwotIEZyYW5rCl9fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fClVzZXJzIG1haWxpbmcgbGlzdAo8 YSBocmVmPSJtYWlsdG86VXNlcnNAb3ZpcnQub3JnIj5Vc2Vyc0BvdmlydC5vcmc8L2E+CjxhIGhy ZWY9Imh0dHA6Ly9saXN0cy5vdmlydC5vcmcvbWFpbG1hbi9saXN0aW5mby91c2VycyI+aHR0cDov L2xpc3RzLm92aXJ0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3VzZXJzPC9hPgo8L3ByZT4NCjwvYmxv Y2txdW90ZT4NCjxicj4NCjx0YWJsZSBjZWxsc3BhY2luZz0iMCIgY2VsbHBhZGRpbmc9IjAiIHdp ZHRoPSIxMDAlIj4NCjx0Ym9keT4NCjx0cj4NCjx0ZD4tLSA8YnI+DQo8YnI+DQpNZWQgVsOkbmxp Z2EgSMOkbHNuaW5nYXI8YnI+DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPGJyPg0KS2FybGkgU2rD tmJlcmc8YnI+DQpTd2VkaXNoIFVuaXZlcnNpdHkgb2YgQWdyaWN1bHR1cmFsIFNjaWVuY2VzPGJy Pg0KQm94IDcwNzkgKFZpc2l0aW5nIEFkZHJlc3MgS3JvbsOlc3bDpGdlbiA4KTxicj4NClMtNzUw IDA3IFVwcHNhbGEsIFN3ZWRlbjxicj4NClBob25lOiAmbmJzcDsmIzQzOzQ2LSgwKTE4LTY3IDE1 IDY2PGJyPg0KPGEgaHJlZj0ibWFpbHRvOmthcmxpLnNqb2JlcmdAYWRtLnNsdS5zZSI+a2FybGku c2pvYmVyZ0BzbHUuc2U8L2E+IDwvdGQ+DQo8L3RyPg0KPC90Ym9keT4NCjwvdGFibGU+DQo8L2Jv ZHk+DQo8L2h0bWw+DQo= --_000_5F9E965F5A80BC468BE5F40576769F0948D549FFexchange21_--

--_000_5F9E965F5A80BC468BE5F40576769F0948D54A5Bexchange21_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 ZnJlIDIwMTMtMTAtMTgga2xvY2thbiAwNToxMiArMDAwMCBza3JldiBLYXJsaSBTasO2YmVyZzoN CnRvciAyMDEzLTEwLTE3IGtsb2NrYW4gMTM6MTIgKzAyMDAgc2tyZXYgRnJhbmsgV2FsbDoNCg0K DQpIaSBNb3RpLA0KDQpPbiAxNy4xMC4yMDEzIDA4OjA0LCBNb3RpIEFzYXlhZyB3cm90ZToNCj4g SSB1c2VkIGlwZXJmIGZvciB0ZXN0aW5nIG11bHRpY2FzdCBiZXR3ZWVuIHRoZSB2bXMuIFNlZQ0K PiBodHRwOi8vaXBlcmYuZnIvI211bHRpY2FzdA0KPiBmb3IgdGhlIGV4YWN0IGNvbW1hbmRzLg0K DQp0aGFua3MsIEkgZGlkIGEgcXVpY2sgdGVzdCB3aXRoIGlwZXJmIHdpdGggYSBnb29kIHJlc3Vs dCAoNDQ1IG91dCBvZiA0NDYNCmRhdGFncmFtcyBjb3VsZCBiZSByZWNlaXZlZCkuIEJ1dCBzdGls bCBwZlNlbnNlL0ZyZWVCU0QgQ0FSUC91Q0FSUCBkb2VzDQpub3Qgd29yaywgaXQgc2VlbXMgdG8g YmUgZmlsdGVyZWQgb24gdGhlIG9WaXJ0L0tWTSBIb3N0LiBIYXZlIHlvdSBldmVyDQpoZWFyZCBv ZiB0aGlzPyBBbnkgaWRlYT8NCg0KDQpEaWRuwrR0IHRoaW5rIG9mIGl0IGZpcnN0IGJ1dCBJwrR2 ZSBhY3R1YWxseSBzZXQgdXAgVk0ncyBhcyAiY2x1c3RlciIgd2l0aCBDQVJQIGFuZCBGcmVlQlNE LCBhbmQgaXQgd29ya2VkIGZsYXdsZXNzbHkgZm9yIG1lIChUTSkuIEnCtG0gcnVubmluZyBvVmly dC0zLjIsIGlmIHRoYXQgaXMgb2YgaW50ZXJlc3QuDQoNCkhtbSwgY29tZSB0byB0aGluayBvZiBp dCwgdGhvc2UgVk0ncyB3ZXJlIGNyZWF0ZWQgYmFjayBpbiAzLjEgZm9yIGEgc3BlY2lmaWMgdGVz dCBhbmQgSSBoYXZlbsK0dCBydW4gdGhlbSBzaW5jZSwgc28gaWYgSSB3YW50ZWQgdG8gcnVuIHRo ZW0gYWdhaW4sIEkgd291bGQgYWxzbyBsaWtlbHkgaGF2ZSB0byBjaGFuZ2UgdGhhdCBzcG9vZmlu ZyBzZXR0aW5nLiBTb3JyeSBmb3IgdGhlIG5vaXNlLg0KDQoNCg0KDQoNCg0KDQpUaGFua3MNCi0g RnJhbmsNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpV c2VycyBtYWlsaW5nIGxpc3QNClVzZXJzQG92aXJ0Lm9yZzxtYWlsdG86VXNlcnNAb3ZpcnQub3Jn Pg0KaHR0cDovL2xpc3RzLm92aXJ0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3VzZXJzDQoNCg0KLS0N Cg0KTWVkIFbDpG5saWdhIEjDpGxzbmluZ2FyDQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpLYXJs aSBTasO2YmVyZw0KU3dlZGlzaCBVbml2ZXJzaXR5IG9mIEFncmljdWx0dXJhbCBTY2llbmNlcw0K Qm94IDcwNzkgKFZpc2l0aW5nIEFkZHJlc3MgS3JvbsOlc3bDpGdlbiA4KQ0KUy03NTAgMDcgVXBw c2FsYSwgU3dlZGVuDQpQaG9uZTogICs0Ni0oMCkxOC02NyAxNSA2Ng0Ka2FybGkuc2pvYmVyZ0Bz bHUuc2U8bWFpbHRvOmthcmxpLnNqb2JlcmdAYWRtLnNsdS5zZT4NCg0KLS0NCg0KTWVkIFbDpG5s aWdhIEjDpGxzbmluZ2FyDQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpLYXJsaSBTasO2YmVyZw0K U3dlZGlzaCBVbml2ZXJzaXR5IG9mIEFncmljdWx0dXJhbCBTY2llbmNlcw0KQm94IDcwNzkgKFZp c2l0aW5nIEFkZHJlc3MgS3JvbsOlc3bDpGdlbiA4KQ0KUy03NTAgMDcgVXBwc2FsYSwgU3dlZGVu DQpQaG9uZTogICs0Ni0oMCkxOC02NyAxNSA2Ng0Ka2FybGkuc2pvYmVyZ0BzbHUuc2U8bWFpbHRv OmthcmxpLnNqb2JlcmdAYWRtLnNsdS5zZT4NCg== --_000_5F9E965F5A80BC468BE5F40576769F0948D54A5Bexchange21_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PCFET0NUWVBFIEhUTUwgUFVCTElDICItLy9XM0MvL0RURCBIVE1MIDQuMCBUUkFOU0lUSU9OQUwv L0VOIj4NCjxodG1sPg0KPGhlYWQ+DQo8bWV0YSBodHRwLWVxdWl2PSJDb250ZW50LVR5cGUiIGNv bnRlbnQ9InRleHQvaHRtbDsgY2hhcnNldD11dGYtOCI+DQo8bWV0YSBuYW1lPSJHRU5FUkFUT1Ii IGNvbnRlbnQ9Ikd0a0hUTUwvNC42LjQiPg0KPC9oZWFkPg0KPGJvZHk+DQpmcmUgMjAxMy0xMC0x OCBrbG9ja2FuIDA1OjEyICYjNDM7MDAwMCBza3JldiBLYXJsaSBTasO2YmVyZzo8YnI+DQo8Ymxv Y2txdW90ZSB0eXBlPSJDSVRFIj50b3IgMjAxMy0xMC0xNyBrbG9ja2FuIDEzOjEyICYjNDM7MDIw MCBza3JldiBGcmFuayBXYWxsOg0KPGJsb2NrcXVvdGUgdHlwZT0iQ0lURSI+DQo8cHJlPgpIaSBN b3RpLAoKT24gMTcuMTAuMjAxMyAwODowNCwgTW90aSBBc2F5YWcgd3JvdGU6Cjxmb250IGNvbG9y PSIjNzM3MzczIj4mZ3Q7IEkgdXNlZCBpcGVyZiBmb3IgdGVzdGluZyBtdWx0aWNhc3QgYmV0d2Vl biB0aGUgdm1zLiBTZWU8L2ZvbnQ+Cjxmb250IGNvbG9yPSIjNzM3MzczIj4mZ3Q7IDxhIGhyZWY9 Imh0dHA6Ly9pcGVyZi5mci8jbXVsdGljYXN0Ij5odHRwOi8vaXBlcmYuZnIvI211bHRpY2FzdDwv YT48L2ZvbnQ+Cjxmb250IGNvbG9yPSIjNzM3MzczIj4mZ3Q7IGZvciB0aGUgZXhhY3QgY29tbWFu ZHMuPC9mb250PgoKdGhhbmtzLCBJIGRpZCBhIHF1aWNrIHRlc3Qgd2l0aCBpcGVyZiB3aXRoIGEg Z29vZCByZXN1bHQgKDQ0NSBvdXQgb2YgNDQ2IApkYXRhZ3JhbXMgY291bGQgYmUgcmVjZWl2ZWQp LiBCdXQgc3RpbGwgcGZTZW5zZS9GcmVlQlNEIENBUlAvdUNBUlAgZG9lcyAKbm90IHdvcmssIGl0 IHNlZW1zIHRvIGJlIGZpbHRlcmVkIG9uIHRoZSBvVmlydC9LVk0gSG9zdC4gSGF2ZSB5b3UgZXZl ciAKaGVhcmQgb2YgdGhpcz8gQW55IGlkZWE/CjwvcHJlPg0KPC9ibG9ja3F1b3RlPg0KPGJyPg0K RGlkbsK0dCB0aGluayBvZiBpdCBmaXJzdCBidXQgScK0dmUgYWN0dWFsbHkgc2V0IHVwIFZNJ3Mg YXMgJnF1b3Q7Y2x1c3RlciZxdW90OyB3aXRoIENBUlAgYW5kIEZyZWVCU0QsIGFuZCBpdCB3b3Jr ZWQgZmxhd2xlc3NseSBmb3IgbWUgKFRNKS4gScK0bSBydW5uaW5nIG9WaXJ0LTMuMiwgaWYgdGhh dCBpcyBvZiBpbnRlcmVzdC48YnI+DQo8L2Jsb2NrcXVvdGU+DQo8YnI+DQpIbW0sIGNvbWUgdG8g dGhpbmsgb2YgaXQsIHRob3NlIFZNJ3Mgd2VyZSBjcmVhdGVkIGJhY2sgaW4gMy4xIGZvciBhIHNw ZWNpZmljIHRlc3QgYW5kIEkgaGF2ZW7CtHQgcnVuIHRoZW0gc2luY2UsIHNvIGlmIEkgd2FudGVk IHRvIHJ1biB0aGVtIGFnYWluLCBJIHdvdWxkIGFsc28gbGlrZWx5IGhhdmUgdG8gY2hhbmdlIHRo YXQgc3Bvb2Zpbmcgc2V0dGluZy4gU29ycnkgZm9yIHRoZSBub2lzZS48YnI+DQo8YnI+DQo8Ymxv Y2txdW90ZSB0eXBlPSJDSVRFIj48YnI+DQo8YmxvY2txdW90ZSB0eXBlPSJDSVRFIj4NCjxwcmU+ CgoKClRoYW5rcwotIEZyYW5rCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fClVzZXJzIG1haWxpbmcgbGlzdAo8YSBocmVmPSJtYWlsdG86VXNlcnNAb3ZpcnQu b3JnIj5Vc2Vyc0BvdmlydC5vcmc8L2E+CjxhIGhyZWY9Imh0dHA6Ly9saXN0cy5vdmlydC5vcmcv bWFpbG1hbi9saXN0aW5mby91c2VycyI+aHR0cDovL2xpc3RzLm92aXJ0Lm9yZy9tYWlsbWFuL2xp c3RpbmZvL3VzZXJzPC9hPgo8L3ByZT4NCjwvYmxvY2txdW90ZT4NCjxicj4NCjx0YWJsZSBjZWxs c3BhY2luZz0iMCIgY2VsbHBhZGRpbmc9IjAiIHdpZHRoPSIxMDAlIj4NCjx0Ym9keT4NCjx0cj4N Cjx0ZD4tLSA8YnI+DQo8YnI+DQpNZWQgVsOkbmxpZ2EgSMOkbHNuaW5nYXI8YnI+DQotLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tPGJyPg0KS2FybGkgU2rDtmJlcmc8YnI+DQpTd2VkaXNoIFVuaXZlcnNp dHkgb2YgQWdyaWN1bHR1cmFsIFNjaWVuY2VzPGJyPg0KQm94IDcwNzkgKFZpc2l0aW5nIEFkZHJl c3MgS3JvbsOlc3bDpGdlbiA4KTxicj4NClMtNzUwIDA3IFVwcHNhbGEsIFN3ZWRlbjxicj4NClBo b25lOiAmbmJzcDsmIzQzOzQ2LSgwKTE4LTY3IDE1IDY2PGJyPg0KPGEgaHJlZj0ibWFpbHRvOmth cmxpLnNqb2JlcmdAYWRtLnNsdS5zZSI+a2FybGkuc2pvYmVyZ0BzbHUuc2U8L2E+IDwvdGQ+DQo8 L3RyPg0KPC90Ym9keT4NCjwvdGFibGU+DQo8L2Jsb2NrcXVvdGU+DQo8YnI+DQo8dGFibGUgY2Vs bHNwYWNpbmc9IjAiIGNlbGxwYWRkaW5nPSIwIiB3aWR0aD0iMTAwJSI+DQo8dGJvZHk+DQo8dHI+ DQo8dGQ+LS0gPGJyPg0KPGJyPg0KTWVkIFbDpG5saWdhIEjDpGxzbmluZ2FyPGJyPg0KLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLTxicj4NCkthcmxpIFNqw7ZiZXJnPGJyPg0KU3dlZGlzaCBVbml2ZXJz aXR5IG9mIEFncmljdWx0dXJhbCBTY2llbmNlczxicj4NCkJveCA3MDc5IChWaXNpdGluZyBBZGRy ZXNzIEtyb27DpXN2w6RnZW4gOCk8YnI+DQpTLTc1MCAwNyBVcHBzYWxhLCBTd2VkZW48YnI+DQpQ aG9uZTogJm5ic3A7JiM0Mzs0Ni0oMCkxOC02NyAxNSA2Njxicj4NCjxhIGhyZWY9Im1haWx0bzpr YXJsaS5zam9iZXJnQGFkbS5zbHUuc2UiPmthcmxpLnNqb2JlcmdAc2x1LnNlPC9hPiA8L3RkPg0K PC90cj4NCjwvdGJvZHk+DQo8L3RhYmxlPg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_5F9E965F5A80BC468BE5F40576769F0948D54A5Bexchange21_--
participants (4)
-
Frank Wall
-
Karli Sjöberg
-
Moti Asayag
-
Yedidyah Bar David