Re: [arch-d] [Int-area] Is IPv6 End-to-End? R.I.P. Architecture? (Fwd: Errata #5933 for RFC8200)

Keith Moore <moore@network-heretics.com> Fri, 28 February 2020 19:23 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D483A3A1998 for <ietf@ietfa.amsl.com>; Fri, 28 Feb 2020 11:23:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W3qrzQAaAXL9 for <ietf@ietfa.amsl.com>; Fri, 28 Feb 2020 11:23:39 -0800 (PST)
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 768523A1993 for <ietf@ietf.org>; Fri, 28 Feb 2020 11:23:37 -0800 (PST)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 7CB6B21E29; Fri, 28 Feb 2020 14:23:34 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Fri, 28 Feb 2020 14:23:34 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=0gWHmU 37LMiboKY+tHeH2kVTsXcSzSsRS5XdBwUDe1Y=; b=ruanZJsdpmo+BhJ6GDu1Dk vJqANLzRg7olOArY7vetw5DlRLTUOzAxzlTGpgA8fnTwnJ3guWpubNA89zkxmGyj 7j9eMpo+n9afmEFJ2/c5hjjhfKKYhGp4LRqnjWk5envS9cXBp5EvGlR2rUvjYGd9 ndUSKxPIHhxfu+0UiWhIx+vSL7EqtSrHBhXIVRqrusEoUi3H6DJNE5rzMFc9saVz EtS2GoUKG0O0LOjlF0gIYRKFzFFeTJWMZZi+aQMpYn1Gb4zSljOkjsVPSbM8mKdz SHNDmbR1TtDBwYkCTFt+5l50lKArnGxH31Geb/mENkZrD4xhSPyN+5MKW2ZCptlQ ==
X-ME-Sender: <xms:tmhZXlxkokOgP1zNPuil_fkBzFX1FP6DcJByT_S9KE5LRoFLTyTOIw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedugedrleekgdduvdefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefuvfhfhffkffgfgggjtgesrgdtre ertdefjeenucfhrhhomhepmfgvihhthhcuofhoohhrvgcuoehmohhorhgvsehnvghtfiho rhhkqdhhvghrvghtihgtshdrtghomheqnecuffhomhgrihhnpegvgigrmhhplhgvrdgtoh hmnecukfhppedutdekrddvvddurddukedtrdduheenucevlhhushhtvghrufhiiigvpedt necurfgrrhgrmhepmhgrihhlfhhrohhmpehmohhorhgvsehnvghtfihorhhkqdhhvghrvg htihgtshdrtghomh
X-ME-Proxy: <xmx:tmhZXnT4Iu8lYR6buWVl4_hNmWUrzqRT-n0DMtwZdZDRcbIQ9w55RQ> <xmx:tmhZXjnsboKwshxgfztAN_2su_mkDOoydmU8ZoTOWyyA-DbZ1j097g> <xmx:tmhZXieQg_X1HGQI3ncCrDtY1bC0WbhSHM6ngqweuKQbuqy1iMIreg> <xmx:tmhZXmLjDIO6lRd5ImSjDbcwYNWV4hpHNqg6ZMs5xBgult36zxr6mA>
Received: from [192.168.1.97] (108-221-180-15.lightspeed.knvltn.sbcglobal.net [108.221.180.15]) by mail.messagingengine.com (Postfix) with ESMTPA id 818C53280059; Fri, 28 Feb 2020 14:23:33 -0500 (EST)
Subject: Re: [arch-d] [Int-area] Is IPv6 End-to-End? R.I.P. Architecture? (Fwd: Errata #5933 for RFC8200)
To: ietf@ietf.org
References: <876c9105-3da4-e614-2db0-bea025b54663@si6networks.com> <7749f91f-03f1-cc14-bae8-5fe68c88879f@si6networks.com> <CALx6S36wN7VEi_rxLC1ETcTvkGaPhs20KhQrGWAGGTrCL5OT+g@mail.gmail.com> <CAMm+Lwg+4xMv=EKLfvmZMCgrQz31+38Fv0bYKeJ0fTB5vbXiaw@mail.gmail.com> <8d3e7b714666db00e0c05a2e06959da6@strayalpha.com> <CAMm+LwjYeSTro_TJujtRPDfVKtVMg7JbDL6A5V3Tj447c2E7nA@mail.gmail.com> <74763844-FA56-43DC-981E-E366E2C24758@strayalpha.com> <CAMm+LwjeWXUmOEzvbUhrG1H8OMqG9EhcF3TzdZBA61LnySSPqw@mail.gmail.com> <CALx6S35ko4zfCWwtR+LTKR6NdH86pVx7E-JoF0Cf4RVZOSJtkA@mail.gmail.com> <CAMm+LwjxxTQmJMPxydMGC5GByHu2qkbd_+W1and=xOMhq2RV6g@mail.gmail.com> <CALx6S34ikDKdKeEfCJQF+ZGdNorsXZHRL=8u8bXdZ1NRpaLmvA@mail.gmail.com> <ce5ac3bd-c5e3-28a5-e4ec-b7c2432783f0@network-heretics.com> <CAMm+LwjpOd5AB0_HYSYA7Ma-WeBhAv_XL9KLP6jiMSGqv9a5eQ@mail.gmail.com>
From: Keith Moore <moore@network-heretics.com>
Message-ID: <636d9177-9ec8-e2da-e76c-497241a1947f@network-heretics.com>
Date: Fri, 28 Feb 2020 14:23:32 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <CAMm+LwjpOd5AB0_HYSYA7Ma-WeBhAv_XL9KLP6jiMSGqv9a5eQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------99884AB9F60126B2C88125A0"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/AeabeUwaUpq_w3-6EpD2HzQQjzg>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 19:23:41 -0000

On 2/28/20 1:58 PM, Phillip Hallam-Baker wrote:
>
>
> On Fri, Feb 28, 2020 at 1:48 PM Keith Moore 
> <moore@network-heretics.com <mailto:moore@network-heretics.com>> wrote:
>
>     On 2/28/20 1:12 PM, Tom Herbert wrote:
>
>     > Yes, but in BSD sockets, the most common networking API, "bind"
>     takes
>     > an address and port number argument, "connect" takes and address and
>     > port number argument, getsockname and getpeername return the
>     > respective pairs set on a socket. So the TCP 4-tuple is very visible
>     > to applications and has been for many years. If there's a better way
>     > to do this that hides this and makes it easier I say go for it, but
>     > please don't call this a solved problem until you've achieved
>     > ubiquitous deployment and we can obsolete the sockets API since
>     no one
>     > is using it anymore.
>
>     And in particular any API that presumes that DNS will be reliable and
>     have the correct address for a peer, or even that it exists at
>     all, is
>     going to suffer from a huge disconnect from reality.
>
>     The beautiful thing about only needing an address and a port (and
>     often,
>     having a default port) is that it doesn't need any higher-layer
>     infrastructure to make it work.   This is a feature, not a bug.
>
>
> OK we are officially done.
>
> DNS is correct by definition. The resolution of example.com 
> <http://example.com> is not a matter for discussion, it is what the 
> DNS resolution service you decide to trust returns.

Sorry, no.    DNS can be, and is often, out of sync with reality.  And 
when DNS fails, as it often does, the IP address still works.  That's 
why millions of local networks use static IP address assignment, because 
it's easier to just use IP addresses than to make sure that DNS always 
works.   For example, when the DNS servers are located elsewhere and the 
local network gets disconnected.

You can claim that such sites should have multiple network links and 
provision their DNS better.   But you don't get to impose your 
requirements on others' operations.

> I have given the application layer view of the transport layer and 
> below. I really don't care if you think we are doing it wrong, that is 
> how we is going to continue to do it.

I'm glad you don't get to dictate how others write applications or 
operate their networks.

>
> There are of course concerns that arise from attempting to use 
> manually configured DNS as the basis for discovery. Manual 
> configuration is unreliable which is why I intend to automate the 
> process at some point.
>
> There should be a single point of management for service hosts in a 
> domain.

Uh, no.   Single points of failure make everything unreliable. 
ESPECIALLY management.

> Hosts should register/deregister the services they provide as they 
> come up and down.

Uh, no.   There are lots of issues with that, including not only 
degraded reliability but also privacy.

> This should also coordinate with the provision of certificates. And 
> the DNS config should be calculated from that. So all the 
> DANE/SPF/TXT/SRV records should be generated automatically.
>
> But if you config manually and people can't reach your service, that 
> is because your DNS is configured to say your service is down. That is 
> not a protocol failure.

No, if you design an application so that it needs unreliable services in 
order to operate reliably, it's a design failure.

Keith