Re: [v6ops] reclassify 464XLAT as standard instead of info

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 22 September 2017 22:50 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 667F9132705 for <v6ops@ietfa.amsl.com>; Fri, 22 Sep 2017 15:50:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5uipwKZusAxt for <v6ops@ietfa.amsl.com>; Fri, 22 Sep 2017 15:50:04 -0700 (PDT)
Received: from mail-pg0-x22f.google.com (mail-pg0-x22f.google.com [IPv6:2607:f8b0:400e:c05::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A4501321DE for <v6ops@ietf.org>; Fri, 22 Sep 2017 15:50:04 -0700 (PDT)
Received: by mail-pg0-x22f.google.com with SMTP id i130so1300970pgc.3 for <v6ops@ietf.org>; Fri, 22 Sep 2017 15:50:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:organization:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=cNNRfB+R055SbDgXPsJaDtxVNeGfXlOWKpRcBDQVtyE=; b=WQs6Y1c+8cE+AgAH84cl310K/OSivLnpggwNB1RHY9uNZnvxzTX319KOyOE6UrIgXw Ou63OlhTSmrfg0qWibjXLOYChw3B6aYMJv4Y5V3WnB+e1c01PuWPYLDxhlTF6xfNzWb9 1Qu3seoSCFrVMZnCyQw1FeKOHZ9m8ASVs07x+XwRUUBKRmhH5PfjyZr7efqZxQ1E8ejq NNH5Ok2JUfYqhJpTzcDaUSfVpQl8qLdXwyst/ZO+WquMkFw3v1Cu3pACJ+LrSRA1lNbj K+i2IyqyZkkOvtONFozI3CCnBomhp3qwjyJtJpZg+viBU+1sz5Tq+9xhqfFwM4PMGZ0K S32A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=cNNRfB+R055SbDgXPsJaDtxVNeGfXlOWKpRcBDQVtyE=; b=bNNKPOwSwpPzcPkb2uiLKWyWIP0AxDcn2laR9FJWgj9D1DveV7WlE5jODlK8AjjDe1 +Nbo6ZKBTO8IjaiOqaculK3FcYw4e1mykBFQYnekuzzAYlnkYyp4ZBOFW/ktYaF1PzqC XxF4VHASfeJ052LMfHnWgndxVQJp9CKFSwh8g8v/pe1lgIXpoh54Pd1qCjy5UQI1by/8 Nv2CnHjmbzGmqTxs9OMsEAVHGnnCvU4xbgpEXm6AOaM4s+Ck4w80M45MpvswcM6QZlCT SgVpqrhMtl9rYuEtlCb++yG+3+nRSDkCSlOHOHhTvm4rHMtR5PrziERHWyNbLxBfHKQe Hg9A==
X-Gm-Message-State: AHPjjUgXz37a6vxFhzHR31pkVdBGxIzahvewx4+GqdY0ibx530NfaSnD wakmJN3RyXyu0jysUAKjZKxCTg==
X-Google-Smtp-Source: AOwi7QALX3Frw+p/bIpb8xL3AKc82nLw/fwgvg6DnInLxJZDYsGKd0R5549c4zwKMtEAVwfKtJV8qA==
X-Received: by 10.99.99.197 with SMTP id x188mr537490pgb.49.1506120603648; Fri, 22 Sep 2017 15:50:03 -0700 (PDT)
Received: from ?IPv6:2406:e001:3f51:1:28cc:dc4c:9703:6781? ([2406:e001:3f51:1:28cc:dc4c:9703:6781]) by smtp.gmail.com with ESMTPSA id 89sm1000655pfn.75.2017.09.22.15.50.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 22 Sep 2017 15:50:01 -0700 (PDT)
To: Ole Troan <otroan@employees.org>
Cc: v6ops@ietf.org
References: <D5E8043B.86B21%lee@asgard.org> <E48DDA04-C058-4992-906E-8C8BC0E102AB@consulintel.es> <1BFA3605-4B16-4331-A7BA-3BDECBCA64EC@gmail.com> <85868796-18C7-48F4-BE69-8D50A1F47EF3@jisc.ac.uk> <472CC0F7-73C2-4A21-8F96-BBC966B01B77@employees.org> <de6b9aac-a3cc-0915-77c7-9fb880c3a16a@gmail.com> <20170921223305.B72A8878E716@rock.dv.isc.org> <122454EE-64C5-4768-A6A9-1AD0E872F5F9@employees.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <2a879713-bfd0-2ba0-cb67-53726f6e1faf@gmail.com>
Date: Sat, 23 Sep 2017 10:50:09 +1200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
In-Reply-To: <122454EE-64C5-4768-A6A9-1AD0E872F5F9@employees.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/5TpqdLoPqMzpuyQPrpcYcAD_80M>
Subject: Re: [v6ops] reclassify 464XLAT as standard instead of info
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Sep 2017 22:50:06 -0000

On 22/09/2017 19:22, Ole Troan wrote:
>>> We have a problem in that people confuse "a standard" with "the standard"
>>> and
>>> "a best current practice" with "the best current prcatice". But in the
>>> end that's
>>> just a matter of wording in the Abstract and Introduction. We say: if you
>>> want
>>> to run a pure IPv6 network service while supporting IPv4-only clients and
>>> servers,
>>> and do not wish to use any form of IPv4-in-IPv6 tunnel, here is a good
>>> way to do it.
>>
>> I'd argue it is a "way to do it".  Good is not a adjective I'd apply
>> to it as it has lots of side effects that impact others that are
>> NOT using it the same way as NAT impacts every developer that uses
>> IPv4.
>>
>> Because 464XLAT is almost always deployed with DNS64 (there are
>> potentially other ways to learn the address mappings):
>>
>> YOU DO NOT KNOW IF THE IPV6 CONNECTION YOU ARE MAKING IS BEING
>> TERMINATED ON A IPV6 NODE.  This restricts what you can do with
>> that connection.  This impacts on EVERY developer.
>>
>> DNS64/NAT64 and 464XLAT needs to die and the earth needs to be
>> salted where they are buried.  They are not like NAT44 where there
>> no other viable alternative.  There are plenty of alternatives.
> 
> From the perspective of forcing every IPv6 application to have to be able to deal with connecting to an IPv4 endpoint.
> Breaking DNSSEC.
> Requiring stateful devices in the network.
> 
> I would suggest this belongs in the newly invented document category: WCP - Worst Current Practice.

How about Best Current Practice for the Worst Current Solution?

I have never advocated v4/v6 translation. I said it was a bad thing
before IPv6 was even designed: https://tools.ietf.org/html/rfc1671#page-3

But we're apparently stuck with it.

    Brian