Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)

Joe Touch <touch@isi.edu> Thu, 11 December 2014 01:26 UTC

Return-Path: <touch@isi.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DC071A1B88; Wed, 10 Dec 2014 17:26:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 00Ent8_g5VLC; Wed, 10 Dec 2014 17:26:49 -0800 (PST)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B01B51A1B4B; Wed, 10 Dec 2014 17:26:49 -0800 (PST)
Received: from [128.9.160.81] (nib.isi.edu [128.9.160.81]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id sBB1Q8kc027867 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 10 Dec 2014 17:26:09 -0800 (PST)
Message-ID: <5488F2B0.5000105@isi.edu>
Date: Wed, 10 Dec 2014 17:26:08 -0800
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Phillip Hallam-Baker <phill@hallambaker.com>
Subject: Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)
References: <9D725DD0-7136-4D02-99E0-48E03C173C9E@iab.org> <BB616542-70E8-47F9-99E8-305AA63B45C9@iab.org> <5475A0A5.50105@necom830.hpcl.titech.ac.jp> <CAMm+Lwjf9jfYhE7rCaLdP32fq5=7GjiVpGpJpw1gTHK7HnivXQ@mail.gmail.com> <54863CFF.7030206@isi.edu> <CAMm+LwgkQgYc=2YLYQcBNjVd8E7sF=+9Th5hN7w8w2StmzqumQ@mail.gmail.com>
In-Reply-To: <CAMm+LwgkQgYc=2YLYQcBNjVd8E7sF=+9Th5hN7w8w2StmzqumQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/ssccYwjxW8Rd8QzfCuyKtw1I8M8
Cc: IAB <iab@iab.org>, IETF <ietf@ietf.org>, IETF Announce <ietf-announce@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 01:26:51 -0000


On 12/8/2014 7:10 PM, Phillip Hallam-Baker wrote:
> 
> 
> On Mon, Dec 8, 2014 at 7:06 PM, Joe Touch <touch@isi.edu
> <mailto:touch@isi.edu>> wrote:
> 
> 
>     > That is because it is a workshop on how the Internet can evolve to
>     > realize the architecture of the stack, not a workshop on how the
>     > architecture of the stack can evolve to address the way people use it.
> 
>     I had thought that part of the meeting would be to address the tension
>     between these two issues, but I have also since learned it has become
>     "how do we evolve the Internet to accept whatever middleboxes want to
>     do" - i.e., precisely the latter of your examples.
> 
>     > The only end points that can be fixed end to end on a network are
>     > cryptographic keys and data bound to cryptographic keys. Ports and IP
>     > addresses are ephemera.
> 
>     Not according to the current Internet architecture, but that's back to
>     my point above.
> 
>     An architecture is defined as much by what it is not as what it is. If
>     everything is on the table as changeable, then there is NO architecture
>     anymore.
> 
> 
> If you believe in 'permissionless innovation' then everything is always
> on the table. 

That's called "anarchy", and the results only serve to increase entropy.

> The Internet architecture to date has been what survived a
> Darwinian process.

First, it's not Darwinian so much as mutation caused by high-energy
radiation, and no, it's not clear to me that "architecture" is
surviving. Sometimes the result is just glowing goo.

> I don't believe in in ancestor worship.

Nor do I; I do believe in deliberate, thoughtful changes to
architecture. That's not the same as the anarchist view, or post-facto
"let's figure out how to change the architecture to accommodate the
anarchy".

In good design, sometimes the answer has to be "NO". If that's not the
case, then you have no architecture.

Joe