Re: [v6ops] reclassify 464XLAT as standard instead of info

Ole Troan <otroan@employees.org> Fri, 22 September 2017 07:22 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAE811342CA for <v6ops@ietfa.amsl.com>; Fri, 22 Sep 2017 00:22:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pTf3jxfvpJP0 for <v6ops@ietfa.amsl.com>; Fri, 22 Sep 2017 00:22:22 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34FE8133187 for <v6ops@ietf.org>; Fri, 22 Sep 2017 00:22:22 -0700 (PDT)
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id 6698E2D4FE9; Fri, 22 Sep 2017 07:22:19 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id 5B14C10C4A3C2; Fri, 22 Sep 2017 09:22:17 +0200 (CEST)
From: Ole Troan <otroan@employees.org>
Message-Id: <122454EE-64C5-4768-A6A9-1AD0E872F5F9@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_6BC794F6-A100-4134-8045-BF2AC7064560"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Fri, 22 Sep 2017 09:22:15 +0200
In-Reply-To: <20170921223305.B72A8878E716@rock.dv.isc.org>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, v6ops@ietf.org
To: Mark Andrews <marka@isc.org>
References: <D5E8043B.86B21%lee@asgard.org> <E48DDA04-C058-4992-906E-8C8BC0E102AB@consulintel.es> <1BFA3605-4B16-4331-A7BA-3BDECBCA64EC@gmail.com> <85868796-18C7-48F4-BE69-8D50A1F47EF3@jisc.ac.uk> <472CC0F7-73C2-4A21-8F96-BBC966B01B77@employees.org> <de6b9aac-a3cc-0915-77c7-9fb880c3a16a@gmail.com> <20170921223305.B72A8878E716@rock.dv.isc.org>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/DMSvpUs9tnB0MF6bg9eElbqOsWQ>
Subject: Re: [v6ops] reclassify 464XLAT as standard instead of info
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Sep 2017 07:22:24 -0000

>> We have a problem in that people confuse "a standard" with "the standard"
>> and
>> "a best current practice" with "the best current prcatice". But in the
>> end that's
>> just a matter of wording in the Abstract and Introduction. We say: if you
>> want
>> to run a pure IPv6 network service while supporting IPv4-only clients and
>> servers,
>> and do not wish to use any form of IPv4-in-IPv6 tunnel, here is a good
>> way to do it.
> 
> I'd argue it is a "way to do it".  Good is not a adjective I'd apply
> to it as it has lots of side effects that impact others that are
> NOT using it the same way as NAT impacts every developer that uses
> IPv4.
> 
> Because 464XLAT is almost always deployed with DNS64 (there are
> potentially other ways to learn the address mappings):
> 
> YOU DO NOT KNOW IF THE IPV6 CONNECTION YOU ARE MAKING IS BEING
> TERMINATED ON A IPV6 NODE.  This restricts what you can do with
> that connection.  This impacts on EVERY developer.
> 
> DNS64/NAT64 and 464XLAT needs to die and the earth needs to be
> salted where they are buried.  They are not like NAT44 where there
> no other viable alternative.  There are plenty of alternatives.

From the perspective of forcing every IPv6 application to have to be able to deal with connecting to an IPv4 endpoint.
Breaking DNSSEC.
Requiring stateful devices in the network.

I would suggest this belongs in the newly invented document category: WCP - Worst Current Practice.

Ole