Re: [v6ops] reclassify 464XLAT as standard instead of info

Ole Troan <otroan@employees.org> Thu, 21 September 2017 20:47 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E86F31330B3 for <v6ops@ietfa.amsl.com>; Thu, 21 Sep 2017 13:47:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1CduvDEb4PvD for <v6ops@ietfa.amsl.com>; Thu, 21 Sep 2017 13:47:12 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10A6F133187 for <v6ops@ietf.org>; Thu, 21 Sep 2017 13:47:11 -0700 (PDT)
Received: from [192.168.10.119] (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id B04AD2D5060; Thu, 21 Sep 2017 20:47:09 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-BDC38B8D-094F-40D1-B461-D7A593BB1BB6"
Mime-Version: 1.0 (1.0)
From: Ole Troan <otroan@employees.org>
X-Mailer: iPhone Mail (15A372)
In-Reply-To: <de6b9aac-a3cc-0915-77c7-9fb880c3a16a@gmail.com>
Date: Thu, 21 Sep 2017 22:47:05 +0200
Cc: v6ops@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <2423DC8E-DE6A-4B81-8969-C7A7DDD74126@employees.org>
References: <D5E8043B.86B21%lee@asgard.org> <E48DDA04-C058-4992-906E-8C8BC0E102AB@consulintel.es> <1BFA3605-4B16-4331-A7BA-3BDECBCA64EC@gmail.com> <85868796-18C7-48F4-BE69-8D50A1F47EF3@jisc.ac.uk> <472CC0F7-73C2-4A21-8F96-BBC966B01B77@employees.org> <de6b9aac-a3cc-0915-77c7-9fb880c3a16a@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/-1WYovBaz8MNl5ILVNTHlbRZQQo>
Subject: Re: [v6ops] reclassify 464XLAT as standard instead of info
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Sep 2017 20:47:14 -0000


> On 21 Sep 2017, at 22:39, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> On 21/09/2017 20:05, Ole Troan wrote:
>>>>>> From my perspective, there are multiple interoperable specs. We have several CLAT client implementations/vendors, from different vendors, and they work fine in the same and different operators and interoperate with different NAT64 and DNS64 vendors/implementations.
>>>>> 
>>>>> What I’m not sure is, because 464XLAT is basically RFC6145 (SIIT) + RFC6146 (Stateful NAT64) and also can use RFC6147 (DNS64), which are already Standards track, if we need also to move them to STD in that case, etc.
>>>> 
>>>> I'll repeat myself earlier. Looking at the definitions of the terms, there is no reason it can't or shouldn't be BCP, which our charter does allow us to do, and which is a one-shot standard more appropriate to the case (IMHO). If you want it to be a standardard, a BCP is a standard. Let's advance it to BCP.
>>> 
>>> I think there’s an argument for this.
>>> 
>>> But there will be people who will argue that encapsulation is the ‘best’ practice.  Is there scope for a BCP by translation and a BCP by encapsulation?  Or would the BCP say NAT64/DNS64/464XLAT is the best way to serve nodes in an IPv6-only network?
>>> 
>>> With IPv4 NAT, the IETF didn’t define specific NAT mechanisms, so we ended up with many varieties, with different properties. There’s an argument also I think to nail down one single best translation approach.
>> 
>> Yes, I do wonder in what alternate universe the IETF consensus is that best current practice is NAT44 -> NAT46 -> NAT64 + DNS64. ;-)
> 
> We have a problem in that people confuse "a standard" with "the standard" and
> "a best current practice" with "the best current prcatice". But in the end that's
> just a matter of wording in the Abstract and Introduction. We say: if you want
> to run a pure IPv6 network service while supporting IPv4-only clients and servers,
> and do not wish to use any form of IPv4-in-IPv6 tunnel, here is a good way to do it.
> 
> That does sound like a BCP to me.

Quite the contrary. 
“Do not wish to...” isn’t a qualifier for deciding if this is what the community considers best current practice. 

Rfc2026 does actually say:
The BCP subseries of the RFC series is designed to be a way to standardize practices and the results of community deliberations. A BCP document is subject to the same basic set of procedures as standards track documents and thus is a vehicle by which the IETF community can define and ratify the community's best current thinking on a statement of principle or on what is believed to be the best way to perform some operations or IETF process function.

Ole