Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?

Mark Smith <markzzzsmith@gmail.com> Sat, 07 November 2015 01:17 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E10F1AD1EE for <v6ops@ietfa.amsl.com>; Fri, 6 Nov 2015 17:17:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.499
X-Spam-Level:
X-Spam-Status: No, score=-0.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6rTrZ8wEwhse for <v6ops@ietfa.amsl.com>; Fri, 6 Nov 2015 17:17:14 -0800 (PST)
Received: from mail-vk0-x230.google.com (mail-vk0-x230.google.com [IPv6:2607:f8b0:400c:c05::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 241091A854B for <v6ops@ietf.org>; Fri, 6 Nov 2015 17:17:14 -0800 (PST)
Received: by vkbk63 with SMTP id k63so14566495vkb.0 for <v6ops@ietf.org>; Fri, 06 Nov 2015 17:17:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=8G2Y9eNYv7AEUg4H0m7cdubYm8aPAl90nuKhafPZou8=; b=uAU5wP6KM3qnnOYdRySJFyc8BBKtPP3d94mItkhj3c7jf5LvBTh7+tNLjxAdSmN1/R CU0JLoHS7KL57vd+DG3kmRtAkDZozs5sxyFR+LPLFrlZ9nfaaTOj3KORCzZ8eo6pCoSd jQFKcGj/4rWq8R4TJtsz2MWgoc9DnvK/DzjjNwdtI5M2TIWRxvtx5+dGNIrjSqLFEv+Q Mmxv87YTCWkyNEWzflP0AXKCPCVEQImpjUNKQ5jEcQrPPpP5DD1thhzd4RmEuHOBly58 RJfzpVeKg6v7HMTlIBqUizNT2SDQbH8YfrfgEsTaGQwGmK6lpy5FcXmvnt3HK/2TOOpF kP8g==
X-Received: by 10.31.54.145 with SMTP id d139mr13465371vka.132.1446859033307; Fri, 06 Nov 2015 17:17:13 -0800 (PST)
MIME-Version: 1.0
Received: by 10.103.67.194 with HTTP; Fri, 6 Nov 2015 17:16:43 -0800 (PST)
In-Reply-To: <563C7C01.6010703@foobar.org>
References: <D25D5920.C914E%Lee.Howard@twcable.com> <5637FDD0.70300@jvknet.com> <D25E32F1.C9507%Lee.Howard@twcable.com> <CAKD1Yr1VvzkSmJo3hu6t_3CUguLN_UkNZjRUqvU_ygPBTyb+8g@mail.gmail.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C2319739@nkgeml506-mbx.china.huawei.com> <CAKD1Yr3g-ZV+MkbtDrusbtYaZ_wmCxDG9XbT25Ldma4koGpV6A@mail.gmail.com> <D25E7DDF.C9709%Lee.Howard@twcable.com> <CAKD1Yr3Vsn7Ny_xSCr_=sVCHyU+=ZrRh2iQDUPx-5FWdHajv2w@mail.gmail.com> <D2614A6A.CA099%Lee.Howard@twcable.com> <563B9D1E.4030606@umn.edu> <D261FE8E.CA1FB%Lee.Howard@twcable.com> <CAKD1Yr3jip0NBkDxg=MvgZXg0LMS+PtREDw2jSRx0xJLqHwhGQ@mail.gmail.com> <563C7C01.6010703@foobar.org>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sat, 07 Nov 2015 12:16:43 +1100
Message-ID: <CAO42Z2zJmNdLhXx1HP-YgOm8PpuSrp14bHsLdDivdnswPNsuAA@mail.gmail.com>
To: Nick Hilliard <nick@foobar.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/MAdp-nTIUJPzxowa5Wxm6ACIJw4>
Cc: IPv6 Operations <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 01:17:16 -0000

On 6 November 2015 at 21:08, Nick Hilliard <nick@foobar.org> wrote:
> On 06/11/2015 00:20, Lorenzo Colitti wrote:
>
> It breaks any application that requires that the application know its source
> address. Examples are SIP, FTP, audio/video chat, etc.
>
> your argument is the wrong way around: some protocols deliberately introduce
> layering violations by demanding that transport identifier information is
> encoded at the application layer.  Transport identifier translation merely
> shows up this brokenness.  The brokenness is not with the translation
> mechanism but with the higher level protocols.
>
> You could argue that this is an angels-on-the-head-of-a-pin style argument
> and that it doesn't matter which bit is broken because at the end of the
> day, breakage happens and users get hurt.  The point is that is IETF working
> groups like to get up on their collective high horses about identifier
> translation but apparently don't bat an eyelid when people create entirely
> new protocols with glaring layering violations.
>
> I'd happy to see disapproval notices for NPTv6 appearing in this draft if
> the IETF first issues explicit recommendations against using SIP, FTP,
> audio/video chat and all other protocols which mandate layering violations.
>

So this draft is advice about what should and shouldn't be done in the network.

Networks need to aim to best facilitate applications, because
supporting applications is the *sole* reason for networks (a network
without applications has no reason to exist). Network shouldn't be
imposing limitations on applications that don't need to be there,
because it creates a cost and causes cost shifting - the cost of those
network limitations ends up being borne by the applications, as they
then have to implement mechanisms to work around those limitations,
and they will, hence STUN, TURN, UDP or HTTP encapsulation of other
protocols.

We know that some applications use IP addresses as identifiers, and we
should be recommending IPv6 network deployments that best support
applications our networks' customers want to use, not telling them
"don't use that application because it stops me using a type of
device/function in the network I might want to use.". Doing so is
forgetting who's creating the need and reason for network operators
existence.

Regards,
Mark.