Re: Next steps on Extension Header Insertion

otroan@employees.org Wed, 02 November 2016 17:39 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71F8C129717 for <ipv6@ietfa.amsl.com>; Wed, 2 Nov 2016 10:39:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.335
X-Spam-Level:
X-Spam-Status: No, score=-1.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=employees.org; domainkeys=pass (1024-bit key) header.from=otroan@employees.org header.d=employees.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lwanXs8Ct6Qd for <ipv6@ietfa.amsl.com>; Wed, 2 Nov 2016 10:39:41 -0700 (PDT)
Received: from inbound03.kjsl.com (inbound03.kjsl.com [IPv6:2001:1868:a100:131::62]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 489F4129463 for <ipv6@ietf.org>; Wed, 2 Nov 2016 10:39:41 -0700 (PDT)
Received: from cowbell.employees.org ([IPv6:2001:1868:a000:17::142]) by ironport03.kjsl.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Nov 2016 17:39:40 +0000
Received: from cowbell.employees.org (localhost [127.0.0.1]) by cowbell.employees.org (Postfix) with ESMTP id 9F4839CC51; Wed, 2 Nov 2016 10:39:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=employees.org; h= content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; s= selector1; bh=Z04nQtbkftwo+GW66ULYVXCZLI4=; b=RXsUn9WIuWIQEA5mwZ xriTy/jXjOyw0qZrBajv8ymDPBzkj10pYe45MMIrUWFQ5YioSgf3R55jHM+CD/3X c9NQKr0+AU6M/xKiQ85Ghg2YSG1t3ONtk80NseTsBJDcWAHZ3sR+lvm1ZCE65yGr ttpM1LZ0w8AnlNbxZRU2VXpAQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=employees.org; h= content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; q=dns; s= selector1; b=kU5ck7CP+ntootzYVZcJjeGp3yO4GTV3tLYa7ndtJPVVhJEBCaw bE5t38WeCVT2/P52q9unFELNXbBsRdCmqSiRzLqjq/GU6hHL9QHuJ71b34U6gyJP n1JUlkSRXx70ECwnOVJZpfI96UWa3o1Vh3lIo8JAhsLNKvUcusWX1x1k=
Received: from h.hanazo.no (unknown [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: otroan) by cowbell.employees.org (Postfix) with ESMTPSA id 721C59CC0F; Wed, 2 Nov 2016 10:39:39 -0700 (PDT)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id 2340458C71D9; Wed, 2 Nov 2016 18:39:37 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 10.1 \(3251\))
Subject: Re: Next steps on Extension Header Insertion
From: otroan@employees.org
In-Reply-To: <9CA73891-B4FA-47DF-82E1-A4867DBC6A3F@steffann.nl>
Date: Wed, 02 Nov 2016 18:39:36 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <3C56AA77-18E4-4254-BB6A-A447CE115392@employees.org>
References: <B291E9E6-A803-423F-BFA5-87A74DCFB784@gmail.com> <dfe00826-1bcd-80ae-e6dc-7763c506cbe4@si6networks.com> <9CA73891-B4FA-47DF-82E1-A4867DBC6A3F@steffann.nl>
To: Sander Steffann <sander@steffann.nl>
X-Mailer: Apple Mail (2.3251)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/a1BfuwloR8VxEOv0ZJvt3hDHMxc>
Cc: Fernando Gont <fgont@si6networks.com>, 6man WG <ipv6@ietf.org>, Bob Hinden <bob.hinden@gmail.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2016 17:39:42 -0000

>> To make my point clear: I'm rather agnostic about SR, but I'm against
>> ambiguity in a std track documents, particularly when behind such
>> ambiguity there's the potential for a lot of problems.
> 
> Well said. Ambiguity is harmful here and will cause serious problems later.

There is absolutely no evidence that the lack of normative text here has led to any problems...

Regardless, it is also impossible to specify all the things creative people shouldn't be allowed to do. And that's probably not the purpose of standardisation either. It is to specify enough to make implementation interoperable.

I'm just trying to point out that we shouldn't blow this issue out of proportion. Whatever we end up doing here, it is hard to see it being particularly important, nor have any big consequences. It would have been nice if the IETF could have decreed that the Internet MUST be end to end transparent, and that middleboxes MUST not exist, but...

Cheers,
Ole