Re: Next steps on Extension Header Insertion

Sander Steffann <sander@steffann.nl> Thu, 03 November 2016 12:15 UTC

Return-Path: <sander@steffann.nl>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2CD112946B for <ipv6@ietfa.amsl.com>; Thu, 3 Nov 2016 05:15:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=steffann.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bj24rsG51mb for <ipv6@ietfa.amsl.com>; Thu, 3 Nov 2016 05:15:23 -0700 (PDT)
Received: from mail.sintact.nl (mail.sintact.nl [83.247.10.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C083129450 for <ipv6@ietf.org>; Thu, 3 Nov 2016 05:15:23 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.sintact.nl (Postfix) with ESMTP id C755C40; Thu, 3 Nov 2016 13:15:20 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=steffann.nl; h= x-mailer:references:message-id:date:date:in-reply-to:from:from :subject:subject:mime-version:content-type:content-type:received :received; s=mail; t=1478175318; bh=ZQg837A3iUN7X2fW1OG9FkOvQUBD kGs9RCypmOoC4bc=; b=PPpaDfIGT6HJmsdeUM+dODatPABF9z5+vEcTvaqR3Ea5 Rh0hK+1kCSgU8zN8LPfRKT1BZuj+DOuw+C+ZM9jewe8/lN3MvkGn7gmtkgP+15O8 ijKS99k3bgGkICVPnSOBS+xYZSGH8PKKndc5d+fDBL8AzBvQEzT1FCyJvy4OkPA=
X-Virus-Scanned: Debian amavisd-new at mail.sintact.nl
Received: from mail.sintact.nl ([127.0.0.1]) by localhost (mail.sintact.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id ln5626Bypbyj; Thu, 3 Nov 2016 13:15:18 +0100 (CET)
Received: from [IPv6:2a02:a213:a300:9300:5d6b:5859:45cd:8d10] (unknown [IPv6:2a02:a213:a300:9300:5d6b:5859:45cd:8d10]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mail.sintact.nl (Postfix) with ESMTPSA id 0635338; Thu, 3 Nov 2016 13:15:17 +0100 (CET)
Content-Type: multipart/signed; boundary="Apple-Mail=_6AB932A9-3E9F-4EDB-9FF6-761834EFC25F"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
Subject: Re: Next steps on Extension Header Insertion
X-Clacks-Overhead: GNU Terry Pratchett
From: Sander Steffann <sander@steffann.nl>
In-Reply-To: <369FB219-9979-43CE-B83D-D7C422FC7711@employees.org>
Date: Thu, 03 Nov 2016 13:15:10 +0100
Message-Id: <53FE6D80-040F-42DA-BA51-F3A40ABF248F@steffann.nl>
References: <B291E9E6-A803-423F-BFA5-87A74DCFB784@gmail.com> <dfe00826-1bcd-80ae-e6dc-7763c506cbe4@si6networks.com> <9CA73891-B4FA-47DF-82E1-A4867DBC6A3F@steffann.nl> <3C56AA77-18E4-4254-BB6A-A447CE115392@employees.org> <CAG6TeAtJdUua3saSGz0SX7DW6hwf74yAexpnfYoP1bg6v1eywA@mail.gmail.com> <17984D1D-1A3C-4AA5-B2EC-BE5C645A272C@steffann.nl> <369FB219-9979-43CE-B83D-D7C422FC7711@employees.org>
To: otroan@employees.org
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/F_FUi3MpzKCqAWJ-MrWmB5xz0Yc>
Cc: Fernando Gont <fgont@si6networks.com>, Bob Hinden <bob.hinden@gmail.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2016 12:15:25 -0000

Hi Ole,

> To paraphrase Michael Moore: "If you as a man is against gay marriage, then you do have the option of not marrying another man".

Everybody is fully entitled to their own way of life and love :)  But the analogy doesn't fit...

> In this context; you have the choice of not deploying any packet mangling middleboxes.

If the mangled packets can be contained in one administrative domain then that's fine. I think that this is the point where the disagreement starts. Standards are about interoperability: everything that goes beyond your administrative domain. I don't care what people do to packets on their network, as long as interoperability doesn't suffer: as long as other operators don't even notice.

So I think the standard should say "this is what externally observable behaviour should/must be" with the understanding that "if you deviate from the standard internally, you must make sure the rest of the world doesn't notice".

I think that's what interoperability is about: your network, your rules, but between networks we use standards-based IPv6.

Cheers,
Sander