Re: sockets APIs extensions for Host Identity Protocol

der Mouse <mouse@Rodents.Montreal.QC.CA> Wed, 09 May 2007 17:27 UTC

Return-path: <discuss-bounces@apps.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HlpwX-0004oY-Fn; Wed, 09 May 2007 13:27:13 -0400
Received: from discuss by megatron.ietf.org with local (Exim 4.43) id 1HlpwV-0004oQ-LT for discuss-confirm+ok@megatron.ietf.org; Wed, 09 May 2007 13:27:11 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HlpwV-0004oI-C1 for discuss@apps.ietf.org; Wed, 09 May 2007 13:27:11 -0400
Received: from sparkle.rodents.montreal.qc.ca ([216.46.5.7]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HlpwT-0001ph-U9 for discuss@apps.ietf.org; Wed, 09 May 2007 13:27:11 -0400
Received: (from mouse@localhost) by Sparkle.Rodents.Montreal.QC.CA (8.8.8/8.8.8) id NAA22503; Wed, 9 May 2007 13:27:08 -0400 (EDT)
From: der Mouse <mouse@Rodents.Montreal.QC.CA>
Message-Id: <200705091727.NAA22503@Sparkle.Rodents.Montreal.QC.CA>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Erik-Conspiracy: There is no Conspiracy - and if there were I wouldn't be part of it anyway.
X-Message-Flag: Microsoft: the company who gave us the botnet zombies.
Date: Wed, 09 May 2007 13:21:45 -0400
To: discuss@apps.ietf.org
Subject: Re: sockets APIs extensions for Host Identity Protocol
In-Reply-To: <20070509121703.GA21070@nic.fr>
References: <Pine.SOL.4.64.0705041801060.14418@kekkonen.cs.hut.fi> <20070507082737.GB21759@nic.fr> <46413DD7.8020702@cs.utk.edu> <20070509121703.GA21070@nic.fr>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 69a74e02bbee44ab4f8eafdbcedd94a1
X-BeenThere: discuss@apps.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: general discussion of application-layer protocols <discuss.apps.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=unsubscribe>
List-Post: <mailto:discuss@apps.ietf.org>
List-Help: <mailto:discuss-request@apps.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=subscribe>
Errors-To: discuss-bounces@apps.ietf.org

> I strongly object to the idea of application programmers dealing with
> NAT, IPv4 vs. IPv6 or source address selection for the eternity.

I object to their having to deal with those issues.  I also object to
their being prevented from dealing with them, even if only because of
diagnostic applications.

> Applications should not have to be "ported to IPv6".

Diagnostic applications aside, I mostly agree.

> They should work the same with both level-3 protocols (and, indeed,
> they do, in every language but C).

Oh, nonsense.  Not every non-C language encapsulates those details
sufficiently to keep applications away from them.  I've seen perl code,
for example, that does pack() and unpack() to construct memory blobs
equivalent to structs sockaddr_in (and which thus needs to be changed
to do likewise for sockaddr_in6, to be v6-ready).

> I also really doubt that the typical application programmer is able
> to do a better job than the kernel / libraries to, choose the source
> address or other level-3 features.

The typical application programmer, perhaps.  But there certainly are
application programmers cokmpetent to manage such details.

> Plus, IMHO, if someone must influence this selection, it should be
> the system and network administrator, not the application programmer.

Sometimes it has to be the application coder, as creator of the user's
proxy to the network.  Some applications are suitable for hiding the
network's complexity, true, but some aren't.

/~\ The ASCII				der Mouse
\ / Ribbon Campaign
 X  Against HTML	       mouse@rodents.montreal.qc.ca
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B