Re: [Edm] [arch-d] Call for Comment: <draft-iab-use-it-or-lose-it-02> (Long-term Viability of Protocol Extension Mechanisms)

Vittorio Bertola <vittorio.bertola@open-xchange.com> Mon, 30 August 2021 08:50 UTC

Return-Path: <vittorio.bertola@open-xchange.com>
X-Original-To: edm@ietfa.amsl.com
Delivered-To: edm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49F4E3A1AC7 for <edm@ietfa.amsl.com>; Mon, 30 Aug 2021 01:50:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.398
X-Spam-Level:
X-Spam-Status: No, score=-4.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=open-xchange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dBPV--KqeCMr for <edm@ietfa.amsl.com>; Mon, 30 Aug 2021 01:50:46 -0700 (PDT)
Received: from mx4.open-xchange.com (alcatraz.open-xchange.com [87.191.39.187]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAD3F3A1ABC for <edm@iab.org>; Mon, 30 Aug 2021 01:50:45 -0700 (PDT)
Received: from imap.open-xchange.com (imap.open-xchange.com [10.20.28.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx4.open-xchange.com (Postfix) with ESMTPSA id 98FA56A0CD; Mon, 30 Aug 2021 10:50:42 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=open-xchange.com; s=201705; t=1630313442; bh=z7oZwZzoK7+gogyv/t/fzZ07MaMAPUS7x7MBKFna4QE=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=o9nlQUkMpKgoqisj1Xi+GY3XLSNuNUdI6HbHthZncwnEDHLdL9yYi6wedhDbyNMLb ENWV/h4TAhM6W7GDzv53IqXDr59NSPfeJ7tmQBRmKxDmaVmruro1c4uc+F90ixm5Dj 5KzzCoLM9cA4GmztNmZP1FL0rK+g+Oey8iQzKRbbg3Qy4x4ud1ji9MLHrUEQ0XD3bq 4VjA6MRciDmGnlBg/mM0qIjttN7L7wbD4dDDhT69LaTbC+lMaJm24617vzScFp60Rr KBdG8ntJiobxuKHceOduqkCVgjrsZtSERwr6g/HlpGgnrrJLWrzfL0eHK5wuSo1vda Sz4xag5jgVBIw==
Received: from appsuite-gw2.open-xchange.com ([10.20.28.82]) by imap.open-xchange.com with ESMTPSA id RyVaJeKbLGEBGQAA3c6Kzw (envelope-from <vittorio.bertola@open-xchange.com>); Mon, 30 Aug 2021 10:50:42 +0200
Date: Mon, 30 Aug 2021 10:50:42 +0200
From: Vittorio Bertola <vittorio.bertola@open-xchange.com>
To: architecture-discuss@ietf.org
Cc: edm@iab.org
Message-ID: <1498471295.29751.1630313442554@appsuite-gw2.open-xchange.com>
In-Reply-To: <59cd4e1c-6fae-8269-e9b9-2eebe0a5a6f3@lear.ch>
References: <162991703946.25379.3009360954932586670@ietfa.amsl.com> <078f0246-6e3f-1a49-38e7-cfdae1539c93@joelhalpern.com> <d12b1bf0-e120-f686-d1af-3f63fea15f56@gmail.com> <b2d2f62f-255c-62e9-9d82-55210f696b35@huitema.net> <59cd4e1c-6fae-8269-e9b9-2eebe0a5a6f3@lear.ch>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_29749_1809498912.1630313442544"
X-Priority: 3
Importance: Normal
X-Mailer: Open-Xchange Mailer v7.10.5-Rev21
X-Originating-Client: open-xchange-appsuite
Autocrypt: addr=vittorio.bertola@open-xchange.com; prefer-encrypt=mutual; keydata= mQENBFhFR+UBCACfoywFKBRfzasiiR9/6dwY36eLePXcdScumDMR8qoXvRS55QYDjp5bs+yMq41qWV9 xp/cqryY9jnvHbeF3TsE5yEazpD1dleRbkpElUBpPwXqkrSP8uXO9KkS9KoX6gdml6M4L+F82WpqYC1 uTzOE6HPmhmQ4cGSgoia2jolxAhRpzoYN99/BwpvoZeTSLP5K6yPlMPYkMev/uZlAkMMhelli9IN6yA yxcC0AeHSnOAcNKUr13yXyMlTyi1cdMJ4sk88zIbefxwg3PAtYjkz3wgvP96cNVwAgSt4+j/ZuVaENP pgVuM512m051j9SlspWDHtzrci5pBKKFsibnTelrABEBAAG0NUJlcnRvbGEsIFZpdHRvcmlvIDx2aXR 0b3Jpby5iZXJ0b2xhQG9wZW4teGNoYW5nZS5jb20+iQFABBMBAgAqBAsJCAcGFQoJCAsCBRYCAwEAAp 4BAhsDBYkSzAMABQMAAAAABYJYRUflAAoJEIU2cHmzj8qNaG0H/ROY+suCP86hoN+9RIV66Ej8b3sb8 UgwFJOJMupZfeb9yTIJwE4VQT5lTt146CcJJ5jvxD6FZn1Htw9y4/45pPAF7xLE066jg3OqRvzeWRZ3 IDUfJJIiM5YGk1xWxDqppSwhnKcMOuI72iioWxX0nGQrWxpnWJsjt08IEEwuYucDkul1PHsrLJbTd58 fiMKLVwag+IE1SPHOwkPF6arZQZIfB5ThtOZV+36Jn8Hok9XfeXWBVyPkiWCQYVX39QsIbr0JNR9kQy 4g2ZFexOcTe8Jo12jPRL7V8OqStdDes3cje9lWFLnX05nrfLuE0l0JKWEg8akN+McFXc+oV68h7nu5A Q0EWEVH5QEIAIDKanNBe1uRfk8AjLirflZO291VNkOAeUu+dIhecGnZeQW6htlDinlYOnXhtsY1mK9W PUu+xshDq7lXn2G0LxldYwyJYZaJtDgIKqVqwxfA34Lj27oqPuXwcvGhdCgt0SW/YcalRdAi0/AzUCu 5GSaj2kaGUSnBYYUP4szGJXjaK2psP5toQSCtx2pfSXQ6MaqPK9Zzy+D5xc6VWQRp/iRImodAcPf8fg JJvRyJ8Jla3lKWyvBBzJDg6MOf6Fts78bJSt23X0uPp93g7GgbYkuRMnFI4RGoTVkxjD/HBEJ0CNg22 hoHJondhmKnZVrHEluFuSnW0wBEIYomcPSPB+cAEQEAAYkBMQQYAQIAGwUCWEVH5QIbDAQLCQgHBhUK CQgLAgUJEswDAAAKCRCFNnB5s4/KjdO8B/wNpvWtOpLdotR/Xh4fu08Fd63nnNfbIGIETWsVi0Sbr8i E5duuGaaWIcMmUvgKe/BM0Fpj9X01Zjm90uoPrlVVuQWrf+vFlbalUYVZr51gl5UyUFHk+iAZCAA0WB rsmACKvuV1P7GuiX3UV9b59T9taYJxN3dNFuftrEuvsqHimFtlekUjUwoCekTJdncFusBhwz2OrKhHr WWrEsXkfh0+pURWYAlKlTxvXuI7gAfHEQM+6OnrWvXYtlhd0M1sBPnCjbyG63Qws7Rek9bEWKtH6dA6 dmT2FQT+g1S9Mdf0WkPTQNX0x24dm8IoHuD3KYwX7Svx43Xa17aZnXqUjtj1
Archived-At: <https://mailarchive.ietf.org/arch/msg/edm/XclILQIIpUqgNPSg9PU4nhZ9GJM>
Subject: Re: [Edm] [arch-d] Call for Comment: <draft-iab-use-it-or-lose-it-02> (Long-term Viability of Protocol Extension Mechanisms)
X-BeenThere: edm@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Evolvability, Deployability, & Maintainability \(Proposed\) Program" <edm.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/edm>, <mailto:edm-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/edm/>
List-Post: <mailto:edm@iab.org>
List-Help: <mailto:edm-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/edm>, <mailto:edm-request@iab.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Aug 2021 08:50:53 -0000

>     Il 26/08/2021 06:24 Eliot Lear <lear@lear.ch> ha scritto:
> 
> 
> 
>     I might point out that some features are intentionally blocked.  Random pings and traceroutes into a network is generally considered unfriendly and have been used as a means to identify points of attack.  There are also features that are unintentionally blocked, simply because they are not understood.  One of the challenges we face is the design choices that permit or deny such blocking.  It's made all the more challenging because protocol designers may not fully understand the weaknesses in their designs.
> 
The "Limiting participation" section is also affected by this. The first paragraph sounds like advocating that we should have less diversity in Internet operations or protocol implementations, so that we can have the few operators agree among themselves on whatever is necessary to make new features work. (This was indeed the approach of the DNS flag day, which was only possible because there are many DNS operators but very few DNS implementers.) Then, the second paragraph provides examples which are rather related to preventing in-network blocking and meddling by middleboxes and network operators.

I think both approaches can help extensibility but create other problems - this should be discussed or at least mentioned.

--

Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com mailto:vittorio.bertola@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy