Re: We don't seem to be following our processes (Re: Network Programming - Penultimate Segment Popping)

Fernando Gont <fgont@si6networks.com> Sat, 07 December 2019 01:37 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A4DD120033 for <ipv6@ietfa.amsl.com>; Fri, 6 Dec 2019 17:37:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CHGmm3Sd_0Fy for <ipv6@ietfa.amsl.com>; Fri, 6 Dec 2019 17:37:55 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7038912003E for <ipv6@ietf.org>; Fri, 6 Dec 2019 17:37:55 -0800 (PST)
Received: from [192.168.4.77] (unknown [190.179.35.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id BD1B082BA7; Sat, 7 Dec 2019 02:37:51 +0100 (CET)
Subject: Re: We don't seem to be following our processes (Re: Network Programming - Penultimate Segment Popping)
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Tom Herbert <tom@herbertland.com>
Cc: 6man <ipv6@ietf.org>
References: <BN7PR05MB56998A05469327E759B5B671AE5D0@BN7PR05MB5699.namprd05.prod.outlook.com> <BN7PR05MB569946D6AA5C6B78AFC05F6BAE5C0@BN7PR05MB5699.namprd05.prod.outlook.com> <8DEDE597-B7B0-48F5-959E-69757315C2AC@employees.org> <BN7PR05MB56996FFC117F512EEA04AFC8AE5C0@BN7PR05MB5699.namprd05.prod.outlook.com> <4FAB68A3-C533-471D-94D0-3F6EB1F32FC1@employees.org> <1e36a492-5931-02de-cf85-63339522b13a@si6networks.com> <F6DD2C7C-DBBF-4B48-B890-3C86005FB9CF@employees.org> <bb3be82d-8ea7-6c29-ad0a-61b491ee997d@si6networks.com> <8A9BC46E-A018-41C0-BE47-4BABC30EFE79@employees.org> <20191205222740.GA9637@ernw.de> <C7BCB0CF-1CA3-4CA8-9E71-13A013955938@employees.org> <430da027-07a7-42f9-60d0-bbb3f3306222@joelhalpern.com> <7c8494a7-9d3c-bd0e-953e-b6dfbb5c5512@gmail.com> <1e721684-0962-4e75-06dc-242cbae74378@si6networks.com> <17b7768e-0a48-61a2-f05a-f6c49ee5f0ff@gmail.com> <CALx6S37dd0cF05TyJYsABU9h=CB_e51CuE=xvaiDjRisav62Eg@mail.gmail.com> <5dc6712a-66aa-d188-5d88-c48d4f9d2590@gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Autocrypt: addr=fgont@si6networks.com; prefer-encrypt=mutual; keydata= mQINBE5so2gBEACzBQBLUy8nzgAzSZn6ViXT6TmZBFNYNqTpPRvTVtUqF6+tkI+IEd9N2E8p pXUXCd0W4dkxz6o7pagnK63m4QSueggvp881RVVHOF8oTSHOdnGxLfLeLNJFKE1FOutU3vod GK/wG/Fwzkv9MebdXpMlLV8nnJuAt66XGl/lU1JrNfrKO4SoYQi4TsB/waUQcygh7OR/PEO0 EttiU8kZUbZNv58WH+PAj/rdZCrgUSiGXiWUQQKShqKnJxLuAcTcg5YRwL8se/V6ciW0QR9i /sr52gSmLLbW5N3hAoO+nv1V/9SjJAUvzXu43k8sua/XlCXkqU7uLj41CRR72JeUZ4DQsYfP LfNPC98ZGTVxbWbFtLXxpzzDDT8i3uo7w1LJ2Ij/d5ezcARqw01HGljWWxnidUrjbTpxkJ9X EllcsH94mer728j/HKzC9OcTuz6WUBP3Crgl6Q47gY5ZIiF0lsmd9/wxbaq5NiJ+lGuBRZrD v0dQx9KmyI0/pH2AF8cW897/6ypvcyD/1/11CJcN+uAGIrklwJlVpRSbKbFtGC6In592lhu7 wnK8cgyP5cTU+vva9+g6P1wehi4bylXdlKc6mMphbtSA+T3WBNP557+mh3L62l4pGaEGidcZ DLYT2Ud18eAJmxU3HnM8P3iZZgeoK7oqgb53/eg96vkONXNIOwARAQABtCVGZXJuYW5kbyBH b250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20+iQJBBBMBAgArAhsjBQkSzAMABgsJCAcDAgYV CAIJCgsEFgIDAQIeAQIXgAUCTmylpQIZAQAKCRCuJQ1VHU50kv7wD/9fuNtTfxSLk3B3Hs3p ixTy8YXVjdkVwWlnJjFd7BOWmg7sI+LDhpjGfT6+ddOiwkumnvUZpObodj4ysH0i8c7P4C5t F9yu7WjklSlrB5Rth2CGChg5bKt541z2WHkFFxys9qBLmCSYDeKQkzLqhCjIUJizY2kOJ2GI MnSFDzJjhSFEh//oW830Y8fel1xnf/NVF+lBVtRMtMOfoWUqDjvP3sJ1G4zgkDCnF0CfncLx +hq2Mv26Uq9OTzvLH9aSQQ/f067BOkKAJKsfHdborX4E96ISTz57/4xECRSMr5dVsKVm4Y// uVIsb+L5z+a32FaiBZIAKDgnJO7Z8j6CV5e5yfuBTtX52Yi9HjYYqnYJGSDxYd6igD4bWu+7 xmJPHjkdqZgGV6dQIgiUfqkU+s5Cv350vK48CMaT/ZLo2BdsMhWsmaHmb+waePUMyq6E4E9x 9Js+EJb9ZiCfxS9exgieZQpet1L36IvhiwByvkQM009ywfa30JeMOltUtfLi5V06WQWsTzPL 5C+4cpkguSuAJVDTctjCA0moIeVDOpJ8WH9voQ4IeWapQnX35OIoj1jGJqqYdx65gc1ygbyx b8vw+pJ9E5GLse5TQnYifOWpXzX9053dtbwp/2OVhU4KLlzfCPCEsoTyfu9nIZxdI2PMwiL5 M85BfjX4NmwBLmPGoLkCDQRObKNoARAAqqXCkr250BchRDmi+05F5UQFgylUh10XTAJxBeaQ UNtdxZiZRm6jgomSrqeYtricM9t9K0qb4X2ZXmAMW8o8AYW3RrQHTjcBwMnAKzUIEXXWaLfG cid/ygmvWzIHgMDQKP+MUq1AGQrnvt/MRLvZLyczAV1RTXS58qNaxtaSpc3K/yrDozh/a4pu WcUsVvIkzyx43sqcwamDSBb6U8JFoZizuLXiARLLASgyHrrCedNIZdWSx0z0iHEpZIelA2ih AGLiSMtmtikVEyrJICgO81DkKNCbBbPg+7fi23V6M24+3syHk3IdQibTtBMxinIPyLFF0byJ aGm0fmjefhnmVJyCIl/FDkCHprVhTme57G2/WdoGnUvnT7mcwDRb8XY5nNRkOJsqqLPemKjz kx8mXdQbunXtX9bKyVgd1gIl+LLsxbdzRCch773UBVoortPdK3kMyLtZ4uMeDX3comjx+6VL bztUdJ1Zc9/njwVG8fgmQ+0Kj5+bzQfUY+MmX0HTXIx3B4R1I1a8QoOwi1N+iZNdewV5Zfq+ 29NlQLnVPjCRCKbaz9k6RJ2oIti55YUI6zSsL3lmlOXsRbXN5bRswFczkNSCJxJMlDiyAUIC WOay7ymzvgzPa+BY/mYn94vRaurDQ4/ljOfj6oqgfjts+dJev4Jj89vp8MQI3KJpZPEAEQEA AYkCJQQYAQIADwUCTmyjaAIbDAUJEswDAAAKCRCuJQ1VHU50km4xEACho45PZrUjY4Zl2opR DFNo5a6roTOPpgwO9PcBb3I5F8yX2Dnew+9OhgWXbBhAFq4DCx+9Gjs43Bn60qbZTDbLGJ/m 8N4PwEiq0e5MKceYcbetEdEUWhm5L6psU9ZZ82GR3UGxPXYe+oifEoJjOXQ39avf9S8p3yKP Diil0E79rn7LbJjMcgMLyjFg9SDoJ6pHLtniJoDhEAaSSgeV7Y745+gyMIdtQmrFHfqrFdjq D6G0HE+Z68ywc5KN67YxhvhBmSycs1ZSKAXv1zLDlXdmjHDHkU3xMcB+RkuiTba8yRFYwb/n j62CC4NhFTuIKOc4ta3dJsyXTGh/hO9UjWUnmAGfd0fnzTBZF8Qlnw/8ftx5lt4/O+eqY1EN RITScnPzXE/wMOlTtdkddQ+QN6xt6jyR2XtAIi7aAFHypIqA3lLI9hF9x+lj4UQ2yA9LqpoX 6URpPOd13JhAyDe47cwsP1u9Y+OBvQTVLSvw7Liu2b4KjqL4lx++VdBi7dXsjJ6kjIRjI6Lb WVpxe8LumMCuVDepTafBZ49gr7Fgc4F9ZSCo6ChgQNLn6WDzIkqFX+42KuHz90AHWhuW+KZR 1aJylERWeTcMCGUSBptd48KniWmD6kPKpzwoMkJtEXTuO2lVuborxzwuqOTNuYg9lWDl7zKt wPI9brGzquUHy4qRrA==
Message-ID: <8abac499-30f2-45ef-44e9-61995b99c513@si6networks.com>
Date: Fri, 06 Dec 2019 22:31:42 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1
MIME-Version: 1.0
In-Reply-To: <5dc6712a-66aa-d188-5d88-c48d4f9d2590@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/rsCBek9n-AqZmVN3i2zbgrxNjwE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Dec 2019 01:37:59 -0000

On 6/12/19 21:07, Brian E Carpenter wrote:
> On 07-Dec-19 12:22, Tom Herbert wrote:
>> On Fri, Dec 6, 2019 at 2:57 PM Brian E Carpenter
>> <brian.e.carpenter@gmail.com> wrote:
>>>
>>> On 07-Dec-19 10:22, Fernando Gont wrote:
>>>> On 6/12/19 17:55, Brian E Carpenter wrote:
>>>>> Joel,
>>>>>
>>>>> On 07-Dec-19 04:09, Joel M. Halpern wrote:
>>>>>> Ole, there is no IETF accepted definition of "limited domain".
>>>>>> There is no IETF rough consensus that it is sensible for us to
>>>>>> standardize things for "limtied domains".
>>>>>
>>>>> That's correct, and that's exactly why the "limited domains" draft
>>>>> was submitted to the Independent Stream. It is a fact, documented in
>>>>> that draft, that quite a lot of chartered IETF work is directed at
>>>>> limited domains.
>>>>
>>>> I'm not necessarily arguing against your point. But I'd note that, when
>>>> it comes to IETF consensus, there's no such a thing as "limited
>>>> domains", and IPv6 is IPv6 -- we don't have any concept of "IPv6 for the
>>>> capital 'I' Internet" and "Modifications for closed domains".
>>>>
>>>> IIRC, I did support your document on int-area (?). So it is not that I'm
>>>> against the concept of limited domains. Just noting that, as
>>>> IETF-conseusns, there's no such a thing.
>>>>
>>>> That said (and without re-looking at your document right now), there's a
>>>> difference between a protocol being effectively employed in a limited
>>>> domain (mDNS, if you wish), vs something like this, in which you are
>>>> *hoping* that your changes don't leak out of your domain... but in fact
>>>> you are not really operating in a limited domain if the src/dst
>>>> addresses of packets span past your "limited domain".
>>>>
>>>>
>>>>
>>>>
>>>>>> While there are standards that are designed for specific deployments,
>>>>>> they do not to date use that as an excuse to violate existing RFCs.
>>>>>
>>>>> I'm not sure that statement is literally 100% correct, because some instances
>>>>> may well have passed unnoticed or without controversy. SRH insertion
>>>>> has not tried to pass unnoticed, and has become controversial.
>>>>
>>>> My own impression is that it did try to pass unnoticed.
>>>
>>> draft-voyer-6man-extension-header-insertion-00, a document that I strongly
>>> criticised, came out March 28, 2017 and its first sentence read "The network
>>> operator and vendor community has clearly indicated that IPv6 header insertion
>>> is useful and required." I *really* think that your impression is wrong. This
>>> has been public for almost 3 years now.
>>>
>>>> Even the latest
>>>> rev of the EH insertion draft doesn't even have a reference to RFC8200.
>>>
>>> Well, the current document editor already said that will be fixed.
>>>
>>>> And if you've read the initial exchange that triggered all other
>>>> comments, an author (?) was kind of trying to educate Ron about the
>>>> document not doing eh insertion/removal.
>>>>
>>>>
>>>>
>>>>
>>>>>> Hence, as far as I can tell, the assertion that SRv6 is for limited
>>>>>> domains does not justify or excuse violating RFC 8200.  And "I want to
>>>>>> save some bytes", while very nice, is not a sufficient reason to violate
>>>>>> an approved RFC, must less a Full Standard.
>>>>>
>>>>> On the other hand, running code in a variety of real and deployed
>>>>> products is something that we have a long tradition of documenting forEven the latest rev of the
>>>>> informational purposes. RFC1094 or RFC3954 for example.
>>>>
>>>> Major difference: None of the two protocols you've reference do an
>>>> outright violation of an IETF standard --- even less an Internet Standard.
>>>
>>> That wasn't my point. (If you want an example that does violate an IS, try RFC1631.)
>>>
>>> My point is that we have often document reality.
>>>
>> Brian,
>>
>> This would seem to establish the blueprint as to how a large vendor
>> can do whatever they want: simply write your protocols however you
>> wish, put it into products and get some deployment, and then take it
>> to IETF to publish as being a "de facto" standard that can't be undone
>> since it's already a reality. What a great way to circumvent the
>> standards process!
> 
> As Joel pointed out, many of the historical cases would be Independent
> Stream submissions today. But yes, the mechanism you describe was invented
> about 30 years ago as far as I can tell. In the end, running code wins.
> We got TLS that way, for example.
> 
> If draft-voyer- ends up published in the Independent Stream, that
> would be fine by me.

I wonder how the EH insertion document does *not* conflict with the work
of any existing WG -- or for instance, existing standard.

-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492