Re: [Rum] IPv6

Paul Kyzivat <pkyzivat@alum.mit.edu> Wed, 01 September 2021 19:54 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B40AE3A17EE for <rum@ietfa.amsl.com>; Wed, 1 Sep 2021 12:54:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hRdos8RdIQg0 for <rum@ietfa.amsl.com>; Wed, 1 Sep 2021 12:54:41 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2066.outbound.protection.outlook.com [40.107.93.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4AD1F3A17EC for <rum@ietf.org>; Wed, 1 Sep 2021 12:54:41 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hBGyGQW5Na42D/BFmUHT4HH7zClLzOwA/366+n2/kJv50I+eIB0c5hR268woZf2r6OwsLc/0+kd4AMX6biw/Y4UAIeYYYXLLhNb9FOi/2DuBCZcrU8vdjluQSPLLs9QiKvrsAOFU0IHQ508biHrwOBmzfzgAR/lZwU9VrO/NLkgvihgyzBe6hY03CF0ZqcbJJwRKTuwtSE0WKkwr+HpnPUjxmXzVczA2gPxm6a8RZd7XAQ0FU1QfgYNU78ezPv+x9hiAHfCbW2p4Aw4rNXpIeJIvZ8xpc9r3NA/kPeNEEXhhCTLhY3tudINB0boMMSjlJPzZdytoVIF+i78LI3uFNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=hUDDhAW5y50vuiN+qUTRpYo9WmHE0eB/UmXBd7vrBRI=; b=TeJE2DLzUduZvV/N92UODx9EmfAHqXFefI+uMsTT/IrlTbAXb8pL1mtvKzF9UzCsTtBO1y4udXFMko5RhoVxuzOC86BTphAsdzSzdAoj0drcFG2CQfI38mQ7LIlHoO0ZSdbxQOwwE9Oj07FMGPbnl5m3sFDkvSN5dkz+lbVqivCGfagBltkfiHpE/oXQENUgipD8qk6+nvGZCMvzg9UP4TwH7iMJebIgq9eI5p7bOMloiz0Da26EsbuZoc5pOIf46R7Ky0gXItlIj4ZxEjY95uwgztmE7azb2yolT2FTa/Q0XyJKjZS1Wv7Bhbawo4ZIAJ3EnjvYaG072dIEbpFJjg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=bestguesspass action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hUDDhAW5y50vuiN+qUTRpYo9WmHE0eB/UmXBd7vrBRI=; b=Rf+9INSORyUgoFUs3XabRQukFPGgT/mz1jjjDRnIImzjMFG4ZvIilARO2CqJEYs/+2WHbWfDCM1jWSa3yos8w5SNO5dzdJt5mgeJMbIhnfO6raWQoF5QptNzn3PrwWVOZZCpuoGRBG7c8ls1WQXwhH3f0DcICuHYSelKTT0QldI=
Received: from DM6PR11CA0070.namprd11.prod.outlook.com (2603:10b6:5:14c::47) by CH2PR12MB5514.namprd12.prod.outlook.com (2603:10b6:610:62::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.19; Wed, 1 Sep 2021 19:54:39 +0000
Received: from DM3NAM02FT037.eop-nam02.prod.protection.outlook.com (2603:10b6:5:14c:cafe::fe) by DM6PR11CA0070.outlook.office365.com (2603:10b6:5:14c::47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.21 via Frontend Transport; Wed, 1 Sep 2021 19:54:39 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by DM3NAM02FT037.mail.protection.outlook.com (10.13.4.166) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.19 via Frontend Transport; Wed, 1 Sep 2021 19:54:39 +0000
Received: from MacBook-Air.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 181JsbhA018678 (version=TLSv1/SSLv3 cipher=AES128-GCM-SHA256 bits=128 verify=NOT) for <rum@ietf.org>; Wed, 1 Sep 2021 15:54:38 -0400
To: rum@ietf.org
References: <DM6PR19MB39305196B68E46EAB26AD999FCCC9@DM6PR19MB3930.namprd19.prod.outlook.com> <A36E8E3C-B421-4242-B368-51D9E21907D4@edvina.net> <CAOPrzE07F2co3=-fJh6gCsY8n2KehLVOqLygF5MyW6C79rdQTw@mail.gmail.com> <DM6PR19MB3930434C5C140C8034BA5944FCCD9@DM6PR19MB3930.namprd19.prod.outlook.com> <1B57966F-B39C-4B80-887D-E9D3DD49DBD1@brianrosen.net> <DM6PR19MB3930CBD7B720EF9D14233F82FCCD9@DM6PR19MB3930.namprd19.prod.outlook.com> <6fb8bd12-25d5-69d4-b13e-d873dd7789f2@alum.mit.edu> <DM6PR19MB3930DB27F1502E0BDBA677C6FCCD9@DM6PR19MB3930.namprd19.prod.outlook.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <b717f442-9078-6d84-a66b-7ee90ba2315e@alum.mit.edu>
Date: Wed, 01 Sep 2021 15:54:37 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <DM6PR19MB3930DB27F1502E0BDBA677C6FCCD9@DM6PR19MB3930.namprd19.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c467e863-521e-4b68-31e4-08d96d82553d
X-MS-TrafficTypeDiagnostic: CH2PR12MB5514:
X-Microsoft-Antispam-PRVS: <CH2PR12MB5514C04A17C2E19F3103C1EFF9CD9@CH2PR12MB5514.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:6108;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:18.7.68.33; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:outgoing-alum.mit.edu; PTR:outgoing-alum.mit.edu; CAT:NONE; SFS:(376002)(396003)(136003)(346002)(39860400002)(36840700001)(46966006)(966005)(2906002)(83380400001)(5660300002)(66574015)(8676002)(82740400003)(7596003)(26005)(6916009)(70206006)(478600001)(30864003)(70586007)(956004)(53546011)(2616005)(47076005)(336012)(31686004)(36860700001)(31696002)(186003)(82310400003)(8936002)(86362001)(75432002)(36906005)(316002)(356005)(43740500002); DIR:OUT; SFP:1101;
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Sep 2021 19:54:39.1626 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c467e863-521e-4b68-31e4-08d96d82553d
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-AuthSource: DM3NAM02FT037.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB5514
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/u-1REfd-A0bdAFDYV_c4OieiplU>
Subject: Re: [Rum] IPv6
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Sep 2021 19:54:48 -0000

On 9/1/21 10:09 AM, Ed Sayers wrote:
> Hi Paul,
> 
> This doesn't save work. It allows the client to do something that the server cannot do.
> This provides the mechanism to cover a wider range of scenarios and a greater chance of ensuring success.
> 
> As I think Olle already indicated previously, it is assumed that clients are already capable of doing this. But, it is not called out anywhere..

I'm not getting it. Can you explain further?

Everything begins with the RUE registering with the server. As long as 
the server offers both v4 and v6 in its DNS entry then the client will 
be able to complete that the registration using whichever it has. Then 
signaling for calls, in both directions. will reuse the TLS connection 
from registration.

For media both ends can offer whichever of v4 or v6 they are using for 
signaling.

So NAT64/DNS64 isn't required.

What am I missing?

	Thanks,
	Paul

> Ed Sayers
> Endpoint SDK Team Lead
> Purple, a Division of ZP Better Together, LLC
> purplevrs.com
> 
> The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.
> 
> 
> 
> 
> -----Original Message-----
> From: Paul Kyzivat <pkyzivat@alum.mit.edu>
> Sent: 01 September 2021 15:06
> To: Ed Sayers <ed.sayers@purple.us>; Brian Rosen <br@brianrosen.net>
> Cc: Olle E. Johansson <oej@edvina.net>; rum@ietf.org
> Subject: Re: [Rum] IPv6
> 
> On 9/1/21 8:18 AM, Ed Sayers wrote:
>> Hi Brian,
>>
>> This only affects the client side, because it is the client may be
>> behind a NAT64/DNS64. The server cannot determine those
>> network-specific mappings.
> 
> Does it really make sense to ask the client to do extra work in order to save work on behalf of the server? If we ask the server to support both then the clients will be able to use whatever kind of addresses they are able to obtain.
> 
> 	Thanks,
> 	Paul
> 
>> **
>>
>> *Ed Sayers*
>> Endpoint SDK Team Lead
>> Purple, a Division of ZP Better Together, LLC purplevrs.com
>> <https://purplevrs.com/>
>>
>> 	
>>
>> Purple is DEI certified!
>>
>> The information contained in this e-mail message is intended only for
>> the personal and confidential use of the recipient(s) named above. If
>> you have received this communication in error, please notify us
>> immediately by e-mail, and delete the original message.
>>
>> *From:*Brian Rosen <br@brianrosen.net>
>> *Sent:* 01 September 2021 13:16
>> *To:* Ed Sayers <ed.sayers@purple.us>
>> *Cc:* Olle E. Johansson <oej@edvina.net>; Paul Kyzivat
>> <pkyzivat@alum.mit.edu>; rum@ietf.org
>> *Subject:* Re: [Rum] IPv6
>>
>> Wouldn’t this apply to both sides?
>>
>> Brian
>>
>>
>>
>>      On Sep 1, 2021, at 4:43 AM, Ed Sayers <ed.sayers@purple.us
>>      <mailto:ed.sayers@purple.us>> wrote:
>>
>>      Hi Brian,
>>
>>      I am sure this is a bit rough and could do with a tidy up. I think
>>      it covers it though:
>>
>>      “
>>
>>      The RUM client MUST supportRFC-6052 and RFC-7050 in order to
>>      synthesize routable IPv6 addresses. For example, when IPv4 addresses
>>      are seen in SIP signalling or SDP but IPv6 addresses are needed by
>>      the client.
>>
>>      “
>>
>>      **
>>
>>      *Ed Sayers*
>>      Endpoint SDK Team Lead
>>      Purple, a Division of ZP Better Together, LLC
>>      purplevrs.com <https://purplevrs.com/>
>>
>>      	
>>
>>      <image001.jpg>
>>
>>      The information contained in this e-mail message is intended only
>>      for the personal and confidential use of the recipient(s) named
>>      above. If you have received this communication in error, please
>>      notify us immediately by e-mail, and delete the original message.
>>
>>      *From:*Brian Rosen <br@brianrosen.net <mailto:br@brianrosen.net>>
>>      *Sent:*31 August 2021 11:23
>>      *To:*Olle E. Johansson <oej@edvina.net <mailto:oej@edvina.net>>
>>      *Cc:*Ed Sayers <ed.sayers@purple.us <mailto:ed.sayers@purple.us>>;
>>      Paul Kyzivat <pkyzivat@alum.mit.edu <mailto:pkyzivat@alum.mit.edu>>;
>>      rum@ietf.org <mailto:rum@ietf.org>
>>      *Subject:*Re: [Rum] IPv6
>>
>>      While I would be willing to work on such a document and as sipvore
>>      chair I sure it would be a welcome draft, as author and co-chit here
>>      I don’t want a mis ref to it holding up our document.
>>
>>      So, I am happy to include those RFCs as requirements. If you want to
>>      suggest any text beyond just making them required, I’d be happy to
>>      include it, and we can then work on a more general draft.
>>
>>      Brian
>>
>>      On Tue, Aug 31, 2021 at 6:05 AM Olle E. Johansson <oej@edvina.net
>>      <mailto:oej@edvina.net>> wrote:
>>
>>
>>
>>           > On 31 Aug 2021, at 11:53, Ed Sayers <ed.sayers@purple.us
>>          <mailto:ed.sayers@purple.us>> wrote:
>>           >
>>           > Hi,
>>           >
>>           > I have separated out IPv6 as a topic.
>>           >
>>           > We all know that IPv6 is the way to go, and also necessary as
>>          the IPv4 address range has all but dried up.
>>           > However, the transition to IPv6 across the World has not been
>>          an easy one and is definitely not 'just SIP'.
>>           >
>>           > It is also very true to say that IPv6 needs to be embraced on
>>          endpoints; US mobile phone carriers were forced to start using
>>          IPv6 for handsets a long time ago.
>>           > However, huge swathes of the Internet remain IPv4, because
>>          adding IPv6 to Infrastructure is not such as easy task to
>>          tackle, and because those IP addresses rarely change compared to
>>          endpoints.
>>           >
>>           > Again, we all agree - IPv6 is the way to go. But, IPv4, NAT64
>>          and DNS64 are going to be needed for a long time to come.
>>           > For many use-cases, DNS64 and NAT64 hide the transition back
>>          to the IPv4 Internet when not supported by Infrastructure.
>>           > But, as we know, SDP include IP addresses that DNS64 and
>>          NAT64 cannot see and will not translate.
>>           >
>>           > Therefore, we'd like to propose for consideration that a RUM
>>          endpoint must also support the following RFCs as a possible fall
>>          back to aid the necessary transition to IPv6 over time:
>>           > * RFC-6052 - IPv6 Addressing of IPv4/IPv6 Translators
>>           > * RFC-7050 - Discovery of the IPv6 Prefix Used for IPv6
>>          Address Synthesis
>>
>>          What makes this special for RUM? Isn’t this support needed for
>>          all SIP implementations? If this is needed for transition, I
>>          would love to see these in a  generic document for SIP - how to
>>          implement it, considerations for SIP and offer/answer as well as
>>          security considerations.
>>
>>          /O
>>           >
>>           >
>>           > Ed Sayers
>>           > Endpoint SDK Team Lead
>>           > Purple, a Division of ZP Better Together, LLC
>>           >purplevrs.com <http://purplevrs.com/>
>>           >
>>           > The information contained in this e-mail message is intended
>>          only for the personal and confidential use of the recipient(s)
>>          named above. If you have received this communication in error,
>>          please notify us immediately by e-mail, and delete the original
>>          message.
>>           >
>>           >
>>           >
>>           >
>>           > -----Original Message-----
>>           > From: Rum <rum-bounces@ietf.org
>>          <mailto:rum-bounces@ietf.org>> On Behalf Of Brian Rosen
>>           > Sent: 30 August 2021 22:24
>>           > To: Paul Kyzivat <pkyzivat@alum.mit.edu
>>          <mailto:pkyzivat@alum.mit.edu>>
>>           > Cc: Chad Leeper <chad.leeper@convorelay.com
>>          <mailto:chad.leeper@convorelay.com>>;rum@ietf.org
>>          <mailto:rum@ietf.org>
>>           > Subject: Re: [Rum] IPv6 and encryption
>>           >
>>           > I don’t think there are ANY alternatives to SRTP.  There are
>>          alternatives to DTLS-SRTP.  There are moves within the IETF to
>>          deprecate SDES, specifically.  There is push back on that, but
>>          it’s an ongoing discussion because SDES isn’t secure enough.
>>            Since all providers I know about anchor media, this only
>>          affects the initial hop.  Users really want to hear that their
>>          media is protected end to end (at least hop by hop) but our
>>          document doesn’t require that.  Again, we need a STANDARDS based
>>          solution, and we have to live within the constraints the IETF
>>          has for new standards with respect to security.  Like nearly
>>          every organization, the IETF is much more security conscious
>>          than it was, and won’t tolerate bad security although it often
>>          recognizes the necessity for backwards compatibility as long as
>>          it’s not to a known insecure mechanism.
>>           >
>>           > I really think this is a “step up to the bar” thing.  We’ve
>>          spent lots of time and cycles implementing things that turn out
>>          not to be secure enough, and we have to move forward on things
>>          that are.  DTLS-SRTP is one of those things, as is IPv6.
>>           >
>>           > Brian
>>           >
>>           >
>>           >> On Aug 30, 2021, at 5:06 PM, Paul Kyzivat
>>          <pkyzivat@alum.mit.edu <mailto:pkyzivat@alum.mit.edu>> wrote:
>>           >>
>>           >> Chad,
>>           >>
>>           >> Welcome to the RUM WG!
>>           >>
>>           >> On 8/30/21 11:51 AM, Chad Leeper wrote:
>>           >>> - While WebRTC w/ SRTP/DTLS (encryption) is an excellent
>>          idea going forward, it can't be a "MUST" requirement.  I agree
>>          with Roger Slusser that mandating compliance using MUST requires
>>          providers to implement significant development to change over to
>>          what RUM is specifying.
>>           >>
>>           >> The requirements in this doc will apply only to devices that
>>          claim to conform to it. Presumably you could continue to support
>>          your existing devices using whatever mechanisms they currently
>>          use. So the implementation burden is only on the server side,
>>          not the legacy device side. (Of course the FCC will have a say
>>          in this.)
>>           >>
>>           >> One motivation for the webrtc requirement is so that a RUE
>>          can be built on top of WebRTC. E.g., it can be a server that
>>          supports deaf users using any device with a browser. Such a
>>          server is effectively just signaling gateway that can establish
>>          a p2p link between the browser and the VRS provider server. (It
>>          does have to transcode RTT, but that is less of a burden.)
>>           >>
>>           >> When defining a specification for an interface that is to be
>>          implemented by independent parties it is necessary for essential
>>          functions to have at least one mandatory to implement mechanism.
>>          Currently there are no standards for connecting a RUE to a
>>          provider, so we need to pick *something* to be mandatory to
>>          implement. If you have an alternative for the media you would
>>          prefer, then please make a specific proposal.
>>           >>
>>           >>> - We should keep any new privacy requirements very minimal
>>          at this time.  While companies in the EU have already created
>>          their systems in compliance with the GDPR, most of the world
>>          hasn't created an equivalent yet.  So what may look like an easy
>>          change to EU implementers may be a dramatic change for others.
>>           >>
>>           >> I don't think we have said much about privacy of retained
>>          data. But we are concerned that the media and signaling be
>>          private between the RUE and the provider. That is a low bar
>>          these days. It is unlikely that anything less could be approved.
>>          I expect the FCC will agree.
>>           >>
>>           >> If you have an alternate proposal that achieves that then
>>          make a proposal we can discuss.
>>           >>
>>           >>      Thanks,
>>           >>      Paul
>>           >>
>>           >>> On Fri, Aug 27, 2021 at 3:16 PM Paul Kyzivat
>>          <pkyzivat@alum.mit.edu
>>          <mailto:pkyzivat@alum.mit.edu><mailto:pkyzivat@alum.mit.edu
>>          <mailto:pkyzivat@alum.mit.edu>>> wrote:
>>           >>>   Providers,
>>           >>>   My request below to Roger should have been broader. You
>>          all seem to
>>           >>>   have
>>           >>>   the same issue. I encourage any/all of you to make an
>>          alternative
>>           >>>   proposal here. Just saying "we don't like what is there"
>>          isn't helpful
>>           >>>   without an alternative.
>>           >>>            Thanks,
>>           >>>            Paul
>>           >>>   On 8/26/21 5:40 PM, Paul Kyzivat wrote:
>>           >>>> Roger,
>>           >>>>
>>           >>>> On 8/26/21 3:30 PM, Roger Slusser wrote:
>>           >>>>
>>           >>>>> Most providers already support encryption and IPV6 on a
>>          limited
>>           >>>   scope,
>>           >>>>> not necessarily the way it is defined in RUM spec. Mandating
>>           >>>>> compliance using MUST requires providers to discard
>>          sometimes huge
>>           >>>>> amounts of development to change over to what RUM is
>>          specifying.
>>           >>>   The
>>           >>>>> push back is not about doing these things it is about the
>>          loss of
>>           >>>>> time, effort and money to do them in the way RUM mandates
>>          with
>>           >>>   MUSTs.
>>           >>>>
>>           >>>> Do you think there is something else we could write in
>>          this spec
>>           >>>   that
>>           >>>> covers encryption and IPv6 in a way that is less
>>          burdensome for
>>           >>>> providers while remaining interoperable with all providers?
>>           >>>>
>>           >>>> If so, can you please spell it out?
>>           >>>   --     Rum mailing list
>>           >>> Rum@ietf.org <mailto:Rum@ietf.org><mailto:Rum@ietf.org
>>          <mailto:Rum@ietf.org>>
>>           >>> https://www.ietf.org/mailman/listinfo/rum
>>          <https://www.ietf.org/mailman/listinfo/rum>
>>           >>>   <https://www.ietf.org/mailman/listinfo/rum
>>          <https://www.ietf.org/mailman/listinfo/rum>>
>>           >>
>>           >> --
>>           >> Rum mailing list
>>           >>Rum@ietf.org <mailto:Rum@ietf.org>
>>           >>https://www.ietf.org/mailman/listinfo/rum
>>          <https://www.ietf.org/mailman/listinfo/rum>
>>           >
>>           > --
>>           > Rum mailing list
>>           >Rum@ietf.org <mailto:Rum@ietf.org>
>>           >https://www.ietf.org/mailman/listinfo/rum
>>          <https://www.ietf.org/mailman/listinfo/rum>
>>           > --
>>           > Rum mailing list
>>           >Rum@ietf.org <mailto:Rum@ietf.org>
>>           >https://www.ietf.org/mailman/listinfo/rum
>>          <https://www.ietf.org/mailman/listinfo/rum>
>>
>