[BEHAVE] Applicability statements for NAT66

Fred Baker <fred@cisco.com> Tue, 18 November 2008 16:42 UTC

Return-Path: <behave-bounces@ietf.org>
X-Original-To: behave-archive@optimus.ietf.org
Delivered-To: ietfarch-behave-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 88AD828C221; Tue, 18 Nov 2008 08:42:23 -0800 (PST)
X-Original-To: behave@core3.amsl.com
Delivered-To: behave@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D58A28C205 for <behave@core3.amsl.com>; Tue, 18 Nov 2008 08:42:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.454
X-Spam-Level:
X-Spam-Status: No, score=-106.454 tagged_above=-999 required=5 tests=[AWL=0.145, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZR4ppnltDCH8 for <behave@core3.amsl.com>; Tue, 18 Nov 2008 08:42:20 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id 4D7F128C1C8 for <behave@ietf.org>; Tue, 18 Nov 2008 08:42:20 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.33,626,1220227200"; d="scan'208";a="196979013"
Received: from sj-dkim-3.cisco.com ([171.71.179.195]) by sj-iport-6.cisco.com with ESMTP; 18 Nov 2008 16:42:19 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254]) by sj-dkim-3.cisco.com (8.12.11/8.12.11) with ESMTP id mAIGgJRk000757; Tue, 18 Nov 2008 08:42:19 -0800
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id mAIGgJR0014875; Tue, 18 Nov 2008 16:42:19 GMT
Received: from xfe-sjc-211.amer.cisco.com ([171.70.151.174]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 18 Nov 2008 08:42:19 -0800
Received: from [130.129.79.33] ([10.21.78.22]) by xfe-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 18 Nov 2008 08:42:19 -0800
Message-Id: <CBA85AB0-AABF-4494-8812-C8EC7CCE56F8@cisco.com>
From: Fred Baker <fred@cisco.com>
To: Margaret Wasserman <mrw@lilacglade.org>
Mime-Version: 1.0 (Apple Message framework v929.2)
Date: Tue, 18 Nov 2008 10:42:18 -0600
X-Mailer: Apple Mail (2.929.2)
X-OriginalArrivalTime: 18 Nov 2008 16:42:19.0348 (UTC) FILETIME=[9F528140:01C9499C]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=6177; t=1227026539; x=1227890539; c=relaxed/simple; s=sjdkim3002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=fred@cisco.com; z=From:=20Fred=20Baker=20<fred@cisco.com> |Subject:=20Applicability=20statements=20for=20NAT66 |Sender:=20; bh=GnYpRrMMQXY+0zS0tuKNadPcJnTmSsHY3QBFRkjdTs8=; b=M8GFUxpGaqt8Ts64bN8PEl9LHeFxlZB6V/we406fJFRdVvianL3Fl8I6RL 57gi6zJ/DLr9YAvcTuib9GMa0YXyKPa5tIMlMA2D4dhFXHQhKR61xXj4zkC9 B/1tr9VA/L;
Authentication-Results: sj-dkim-3; header.From=fred@cisco.com; dkim=pass ( sig from cisco.com/sjdkim3002 verified; );
Cc: "behave@ietf.org WG" <behave@ietf.org>
Subject: [BEHAVE] Applicability statements for NAT66
X-BeenThere: behave@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: mailing list of BEHAVE IETF WG <behave.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/behave>, <mailto:behave-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/behave>
List-Post: <mailto:behave@ietf.org>
List-Help: <mailto:behave-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/behave>, <mailto:behave-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: behave-bounces@ietf.org
Errors-To: behave-bounces@ietf.org

One thing that bothers me in the NAT66 document is the commentary  
about recommended utility. I am of the opinion that there are at least  
two obvious use cases for IPv6/IPv6 NAT: business-to-business ULA-to- 
ULA exchanges with the intention of topology hiding (see http://tools.ietf.org/id/draft-baker-v6ops-b2b-private-routing 
  for a discussion), and GSE. As such, while a subset of the IETF has  
a strong aversion to translation in general and IPv6/IPv6 translation  
in specific, a proper applicability statement would recognize the use  
cases.

Also, IETF applicability statements are generally separate from the  
statement of the algorithm they comment on. I list a few of these at  
the end of this note.

As such, I would strongly recommend that any applicability statement  
be a companion document to NAT66 as opposed to having a half-baked  
statement in the interior of the document.




http://www.ietf.org/rfc/rfc1722.txt
1722 RIP Version 2 Protocol Applicability Statement. G. Malkin.
      November 1994. (Format: TXT=10236 bytes) (Also STD0057) (Status:
      STANDARD)

http://www.ietf.org/rfc/rfc2005.txt
2005 Applicability Statement for IP Mobility Support. J. Solomon.
      October 1996. (Format: TXT=10509 bytes) (Status: PROPOSED  
STANDARD)

http://www.ietf.org/rfc/rfc2039.txt
2039 Applicability of Standards Track MIBs to Management of World Wide
      Web Servers. C. Kalbfleisch. November 1996. (Format: TXT=31966  
bytes)
      (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc2081.txt
2081 RIPng Protocol Applicability Statement. G. Malkin. January 1997.
      (Format: TXT=6821 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc2208.txt
2208 Resource ReSerVation Protocol (RSVP) -- Version 1 Applicability
      Statement Some Guidelines on Deployment. A. Mankin, Ed., F.  
Baker, B.
      Braden, S. Bradner, M. O`Dell, A. Romanow, A. Weinrib, L. Zhang.
      September 1997. (Format: TXT=14289 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc2333.txt
2333 NHRP Protocol Applicability Statement. D. Cansever. April 1998.
      (Format: TXT=20164 bytes) (Status: PROPOSED STANDARD)

http://www.ietf.org/rfc/rfc2721.txt
2721 RTFM: Applicability Statement. N. Brownlee. October 1999.
      (Format: TXT=21200 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3037.txt
3037 LDP Applicability. B. Thomas, E. Gray. January 2001. (Format:
      TXT=13601 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3197.txt
3197 Applicability Statement for DNS MIB Extensions. R. Austein.
      November 2001. (Format: TXT=8610 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3210.txt
3210 Applicability Statement for Extensions to RSVP for LSP-Tunnels.
      D. Awduche, A. Hannan, X. Xiao. December 2001. (Format: TXT=17691
      bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3213.txt
3213 Applicability Statement for CR-LDP. J. Ash, M. Girish, E. Gray,
      B. Jamoussi, G. Wright. January 2002. (Format: TXT=14489 bytes)
      (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3257.txt
3257 Stream Control Transmission Protocol Applicability Statement. L.
      Coene. April 2002. (Format: TXT=24198 bytes) (Status:  
INFORMATIONAL)

http://www.ietf.org/rfc/rfc3294.txt
3294 General Switch Management Protocol (GSMP) Applicability. A.
      Doria, K. Sundell. June 2002. (Format: TXT=18294 bytes) (Status:
      INFORMATIONAL)

http://www.ietf.org/rfc/rfc3346.txt
3346 Applicability Statement for Traffic Engineering with MPLS. J.
      Boyle, V. Gill, A. Hannan, D. Cooper, D. Awduche, B. Christian,  
W.S.
      Lai. August 2002. (Format: TXT=33754 bytes) (Status:  
INFORMATIONAL)

http://www.ietf.org/rfc/rfc3410.txt
3410 Introduction and Applicability Statements for Internet-Standard
      Management Framework. J. Case, R. Mundy, D. Partain, B. Stewart.
      December 2002. (Format: TXT=61461 bytes) (Obsoletes RFC2570)  
(Status:
      INFORMATIONAL)

http://www.ietf.org/rfc/rfc3612.txt
3612 Applicability Statement for Restart Mechanisms for the Label
      Distribution Protocol (LDP). A. Farrel. September 2003. (Format:
      TXT=35677 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc3617.txt
3617 Uniform Resource Identifier (URI) Scheme and Applicability
      Statement for the Trivial File Transfer Protocol (TFTP). E. Lear.
      October 2003. (Format: TXT=11848 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc4130.txt
4130 MIME-Based Secure Peer-to-Peer Business Data Interchange Using
      HTTP, Applicability Statement 2 (AS2). D. Moberg, R. Drummond.  
July
      2005. (Format: TXT=99857 bytes) (Status: PROPOSED STANDARD)

http://www.ietf.org/rfc/rfc4166.txt
4166 Telephony Signalling Transport over Stream Control Transmission
      Protocol (SCTP) Applicability Statement. L. Coene, J. Pastor- 
Balbas.
      February 2006. (Format: TXT=46659 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc4365.txt
4365 Applicability Statement for BGP/MPLS IP Virtual Private Networks
      (VPNs). E. Rosen. February 2006. (Format: TXT=77924 bytes)  
(Status:
      INFORMATIONAL)

http://www.ietf.org/rfc/rfc5045.txt
5045 Applicability of Remote Direct Memory Access Protocol (RDMA) and
      Direct Data Placement (DDP). C. Bestler, Ed., L. Coene. October  
2007.
      (Format: TXT=51749 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc5197.txt
5197 On the Applicability of Various Multimedia Internet KEYing
      (MIKEY) Modes and Extensions. S. Fries, D. Ignjatic. June 2008.
      (Format: TXT=76848 bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc5253.txt
5253 Applicability Statement for Layer 1 Virtual Private Network
      (L1VPN) Basic Mode. T. Takeda, Ed.. July 2008. (Format: TXT=42675
      bytes) (Status: INFORMATIONAL)

http://www.ietf.org/rfc/rfc5387.txt
5387 Problem and Applicability Statement for Better-Than-Nothing
      Security (BTNS). J. Touch, D. Black, Y. Wang. November 2008.  
(Format:
      TXT=71707 bytes) (Status: INFORMATIONAL)

_______________________________________________
Behave mailing list
Behave@ietf.org
https://www.ietf.org/mailman/listinfo/behave