Re: [IPv6] PvD (RFC 8801) is not relevant to MHMP

Michael Richardson <mcr@sandelman.ca> Thu, 01 December 2022 19:24 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFC59C156E3C for <ipv6@ietfa.amsl.com>; Thu, 1 Dec 2022 11:24:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c8YTGnGi-fhW for <ipv6@ietfa.amsl.com>; Thu, 1 Dec 2022 11:24:24 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29480C14CE54 for <ipv6@ietf.org>; Thu, 1 Dec 2022 11:20:55 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 70C531800E; Thu, 1 Dec 2022 14:47:04 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id eg-247971Sih; Thu, 1 Dec 2022 14:47:03 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id C9E711800D; Thu, 1 Dec 2022 14:47:03 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sandelman.ca; s=mail; t=1669924023; bh=lZwcF1O5ZUygGR4SQZ15a2vKOfsxk3gdXWJ4Jym7Ih8=; h=From:To:cc:Subject:In-Reply-To:References:Date:From; b=RanpvYl8jFPvAO+md3IY5Jo57nn8+LGkUYAcIG8gyyqILTJTXWzJ9PHvVDZoWcEtC W5CVwjDBH750tFwwICZMAWp2SiiMd0M7ckY9ovJyQ0vjbwblwhCvZKAleS57Phpaon 6iU+2zwxhyApAxcO3Wejc1hB7XOLGSW99fJSJ04/5dAkMW6ird4wrEEkM0JDq/b5Ju JDqm73nRM44JnpBTLGamHEcVE+SJd7LHCo0zZoIvugkrskZDRHIRV3GGx6ObWiETCV hzJFpfAajj0dNk/pJxWMDkE+i0IN7z5zv9fIKsU7fLRUllgLLztB6/JXiMmF5sDPoo NaMP6YRbcNjlw==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 4FD61440; Thu, 1 Dec 2022 14:20:53 -0500 (EST)
From: Michael Richardson <mcr@sandelman.ca>
To: "ipv6@ietf.org" <ipv6@ietf.org>
cc: Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
In-Reply-To: <8e49314ba8304b54be88fc365987a97c@huawei.com>
References: <8e49314ba8304b54be88fc365987a97c@huawei.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 27.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Thu, 01 Dec 2022 14:20:53 -0500
Message-ID: <15402.1669922453@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/rBUaDM7ZmMyCAMTa4BYy5PjtqS0>
Subject: Re: [IPv6] PvD (RFC 8801) is not relevant to MHMP
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Dec 2022 19:24:29 -0000

Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org> wrote:
    > If the application would use getaddrinfo(), Then the host would still
    > try to choose the next-hop initially (RFC6724) in a random manner (ND
    > section 6.3.6).  If the wrong physical or virtual router is chosen then
    > rule 5.5 RFC 6724 would restrict PIOs applicably (the wrong PIO would
    > be chosen too).  As a result, the packet would try to access the
    > "walled garden" from the wrong address pace, it would be dropped.

I think that the bug is getaddrinfo().
I think that we need a higher-level API that asks for a socket to a name.

That should result in some IPC to a daemon that knows stuff (like the current
happy-eyeballs state), and stuff like PvD, and which user is allowed to
run up bills for which ISP. (For "user" you can now understand "container",
or "app"...).  The daemon would return one (or maybe more.. for QUIC) sockets.

The problem is finding someone to do this new work, and to manage to get it
into major operating systems.  Google has done 80% of this work for Android,
as I understand it.

    > I do not see how PvD is helping MHMP at all.  Because multiplying
    > routers number on the link is not a solution when the host is not
    > capable to choose which one to use.  The host would still have chances

I agree.

I've long thought that PvD is an IPv4 answer to a problem created by
incompetent marketing people.   There are smarter IPv6 answers, which can
result in even better marketing options for differentiated levels of service.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [