Re: [IPv6] Adoption call for draft-bctb-6man-rfc6296-bis

Ole Troan <otroan@employees.org> Sat, 23 March 2024 06:19 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6A06C14F5F5 for <ipv6@ietfa.amsl.com>; Fri, 22 Mar 2024 23:19:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=employees.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGKeULs4Olh6 for <ipv6@ietfa.amsl.com>; Fri, 22 Mar 2024 23:19:50 -0700 (PDT)
Received: from proxmox01.kjsl.com (proxmox01.kjsl.com [204.87.183.6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ADA9EC14F5F3 for <ipv6@ietf.org>; Fri, 22 Mar 2024 23:19:50 -0700 (PDT)
Received: from proxmox01.kjsl.com (localhost.localdomain [127.0.0.1]) by proxmox01.kjsl.com (Proxmox) with ESMTP id 37BD6E4AA1; Sat, 23 Mar 2024 06:19:50 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=employees.org; h=cc:cc:content-transfer-encoding:content-type:content-type :date:from:from:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to; s=prox2023; bh=H7qliyYPFDwcJH31 Y/EYQfhX31nxwXr6xXXLldky9D0=; b=KCgvnOxgR82DKnbOxVB8v2LinJCctPQj l/5R5xL67Ga6yjrbPfllLL2/I0oGzJOUvEgGWwr+sVDmOf8SjFNEpKyik+CSk5cb 1CcCl5HwZDQOEb0PpWqVAi7Uu1LLS4GtlFXcVVa83TNPCiY8Sdn+IzcfdIfcB5AT gVt2TLVFDYu0sWl4ITDRTFZ6y0B7HWLCOYE9VItr8GNbK2LHhxn2PtpHH1ZlkMCU QV7L//0iDXALnZKhaFP4tmIgtFalpGz+9nZTEPNJuxLZzKq0bx43mgfDx76gBseO KNDTyDQv5pM8lOuOpyL7E2lxpYjkk3QuC1iYRTzzlUVGU4qTqKBSsA==
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by proxmox01.kjsl.com (Proxmox) with ESMTPS id 16005E4A9D; Sat, 23 Mar 2024 06:19:50 +0000 (UTC)
Received: from smtpclient.apple (ti0389q160-5480.bb.online.no [95.34.1.168]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 4CC374E11BF1; Sat, 23 Mar 2024 06:19:49 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
From: Ole Troan <otroan@employees.org>
In-Reply-To: <27503357-b53c-4b1f-87a2-918923c439dd@gmail.com>
Date: Sat, 23 Mar 2024 07:19:36 +0100
Cc: Ted Lemon <mellon@fugue.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A156FB21-AA00-47E8-9897-57295B080FE5@employees.org>
References: <CAPt1N1mOyG2jrLcK3Gc47_i-XkbVPY=GweTMWNKOK7O00BpaFg@mail.gmail.com> <04BB59E2-D7DD-4409-A5AB-17321FA8E061@employees.org> <CAPt1N1=s9MRr48-ZiQp3FEydj9TWuq9RjTTTcmxOsMxaQNsb7w@mail.gmail.com> <27503357-b53c-4b1f-87a2-918923c439dd@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/WXez4pSbE8eUEY7di8H5BAhIdQs>
Subject: Re: [IPv6] Adoption call for draft-bctb-6man-rfc6296-bis
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Mar 2024 06:19:55 -0000


> On 23 Mar 2024, at 02:26, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> On 23-Mar-24 12:19, Ted Lemon wrote:
>> Ole, it sounds like you are saying that we don’t need end to end transparency. I don’t really know how to respond to that. Technology takes time to do right. At the moment I don’t know of the killer app for end to end, but certainly apps like signal and telegram would benefit from it. Lorenzo has brought up zoom, which uses its external address for rendezvous.
> 
> *Obviously* today's apps work around the problem of broken references caused by NAT, because they have to.
> 
> Why should we encumber future apps with this problem when we don't have to?

I wanted to point out that _even_ without NAT it’s quite tricky to get an end-to-end transparent application right.
And that we haven’t made it easier with ephemeral addressing, NAT64.
Presumably there will also be edge firewalls in IPv6 or some other security functions.

30 years in, someone must have built this application by now, if it’s nothing more than mosh.

O.

> 
>   Brian
> 
>> Op za 23 mrt 2024 om 08:10 schreef Ole Trøan <otroan@employees.org <mailto:otroan@employees.org>>
>>>    On 22 Mar 2024, at 22:25, Ted Lemon <mellon@fugue.com <mailto:mellon@fugue.com>> wrote:
>>> 
>>>    
>>>    You have a single address you can’t advertise in the dns, yes. If you had a GUA you could advertise it in the DNS and have confidence that it would be reachable for some time.  Sometimes you’d be wrong, but usually not. If you have two GUAs you advertise both and let happy eyeballs take care of it.
>>    Yes, hand-waving is not hard.
>>    Do we have an example application that does all that’s required? Open source?
>>    I struggle to think of anything, but surely someone must take advantage of the end to end transparency in IPv6…
>>    Cheers
>>    Ole
>>> 
>>>    Op za 23 mrt 2024 om 05:53 schreef Ole Troan <otroan=40employees.org@dmarc.ietf.org <mailto:40employees.org@dmarc.ietf.org>>
>>> 
>>>        Brian,
>>> 
>>>        >>> I don't support adoption.
>>>        >>>
>>>        >>> When NAT was first introduced, I experienced a lot of trouble. There may be fewer problems these days, but I think the reason is that applications are built with NAT in mind. In other words, I think it limits the ability to create applications.
>>>        >>>
>>>        >>> I think it is undesirable that something works in an environment without NAT but does not work in an environment with NAT. If this happens, should I fix the application or the network?
>>>        >>>
>>>        >>> I think it would be desirable to regain an environment where applications can be created without restrictions, and I think that would make the Internet better.
>>>        >>>
>>>        >>> Even though IPv6 can eliminate this restriction, I do not agree with restricting applications with NPTv6.
>>>        >> Could you say a little more about _how_ NPTv6 restricts applications?
>>>        >
>>>        > That's a slightly strange question since the draft already has a "Implications for Applications" section. Possibly it needs modernisation.
>>> 
>>>        Perhaps I should have phrased it better. I meant what concerns he has outside of what’s already in the application section of the document.
>>> 
>>>        > But I think Naoki is missing the trade-off here, and the comparison with our bad experience with NAPT44
>>>        > and even with NAT444 is too simple.
>>>        >
>>>        > There are a few scenarios where NPTv6 makes things better for a user, because otherwise they will lose connectivity. Outside those scenarios, NPTv6 is a bad thing and should not be enabled.
>>>        >
>>>        > It's quite different from NAPT44. I could not use any IPv4-only resource without NAPT44. I can use every IPv6 resource without NPTv6. That's the situation for the majority of users.
>>> 
>>>        I think we are somewhat glossing over the complexities of what a native IPv6 application would have to deal with if it was acting as server.
>>>        And I don’t know if we have written this down or we have good patterns in implementations to follow.
>>> 
>>>        An IPv6 host has multiple addresses with different reachability properties and lifetimes. And they may or may not be ephemeral. No way for the host to know.
>>>        It has to pick one, and avoid picking one that leaks any of the temporary addresses, and somehow get that registered in DNS.
>>>        Or exchange the right set of addresses through something like ICE.
>>>        Deal with the consequences when these addresses change.
>>> 
>>>        And if stuck behind a stateful firewall, an IPv6 application would have to do some sort of firewall traversal.
>>>        And if the destination is behind a NAT64, it would have to do the full set of IPv4 NAPT traversal techniques (and most of these are now going to be endpoint dependent NATs).
>>> 
>>>        All this, without even involving NPTv6.
>>>        In my NPTv6 setup, I have a single IPv6 address. With infinite lifetime.
>>>        >From an application implementation perspective I am not convinced that this is not a lot easier to implement than the above with ephemeral global addressing.
>>> 
>>>        Cheers,
>>>        Ole
>>> 
>>> 
>>>        --------------------------------------------------------------------
>>>        IETF IPv6 working group mailing list
>>>        ipv6@ietf.org <mailto:ipv6@ietf.org>
>>>        Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 <https://www.ietf.org/mailman/listinfo/ipv6>
>>>        --------------------------------------------------------------------
>>> 
>>>    --------------------------------------------------------------------
>>>    IETF IPv6 working group mailing list
>>>    ipv6@ietf.org <mailto:ipv6@ietf.org>
>>>    Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 <https://www.ietf.org/mailman/listinfo/ipv6>
>>>    --------------------------------------------------------------------
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------