Re: [v6ops] The need for local-ipv4 socket transition solutions -- NAT64/DNS64 remains insufficient

Ca By <cb.list6@gmail.com> Sat, 04 April 2015 13:02 UTC

Return-Path: <cb.list6@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41EDE1B2AFE for <v6ops@ietfa.amsl.com>; Sat, 4 Apr 2015 06:02:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.149
X-Spam-Level:
X-Spam-Status: No, score=-0.149 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, J_CHICKENPOX_38=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id INUPubqR_9oD for <v6ops@ietfa.amsl.com>; Sat, 4 Apr 2015 06:02:20 -0700 (PDT)
Received: from mail-wi0-x233.google.com (mail-wi0-x233.google.com [IPv6:2a00:1450:400c:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0EA31A90A0 for <v6ops@ietf.org>; Sat, 4 Apr 2015 06:02:19 -0700 (PDT)
Received: by wiaa2 with SMTP id a2so164395680wia.0 for <v6ops@ietf.org>; Sat, 04 Apr 2015 06:02:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=sv9LfKWTc8DiULurkLymjV/7D94ezPJow+UTdJOe+XU=; b=hEDhB8UBb5FDuimNomS+DM2hMmPqN4PQHK8FUVkhnsN8olm2UcDa/zzuT25G+jqIff DLIH0Rjj2QCwzKyKRaPfhnYSWUxGj/lYfupbZMR4SpRcb2fBhMowmXllLu3SlZei/3PF F5H2TcgTsglmCSFFLNEend7PCSMWu88Ua87lxjbLxitTHzlfhyxwDcn80HUdfrFqiOBD 2alcpkQx7M+PZglyqkzrCA5OErCngw8KveO1Dca6GpPP0rIb/zHYNMrC3IznQ6DwK3Vk hZX+Em58lZ5i6aqrr4E22Cz51iDNvgsC7RxkzOZkfWqNY2RUeiMdz8gD9Vic+cAtvHq5 rPfg==
MIME-Version: 1.0
X-Received: by 10.194.77.230 with SMTP id v6mr14089739wjw.25.1428152538284; Sat, 04 Apr 2015 06:02:18 -0700 (PDT)
Received: by 10.194.93.164 with HTTP; Sat, 4 Apr 2015 06:02:18 -0700 (PDT)
In-Reply-To: <CADhXe50M2rf14sB3Gv9BYA9invjo4CebebS6FR6dBvck4xNYaQ@mail.gmail.com>
References: <CAD6AjGT-hG-uvRQvRosrZtfrf0Nb8ne9jy=tD9oh=5zNM42Xsg@mail.gmail.com> <alpine.DEB.2.02.1503200639340.20507@uplift.swm.pp.se> <20150320134204.32af9c67@echo.ms.redpill-linpro.com> <A0BB7AD89EA705449C486BDB5FDCBC7B28518DD8@OPE10MB06.tp.gk.corp.tepenet> <550F1F1F.3060703@cernet.edu.cn> <CAD6AjGSxk-Hrf_NBOjpV-jvraG+xSA4p1j-AO+FQFcVGzuf1Lg@mail.gmail.com> <CAKD1Yr3ywVy_00GYuw4Eq6cW_ZeL16bxpquaWWDMgSz44LagAg@mail.gmail.com> <CAD6AjGS-QMi+3oVGWDxnSMhEJH=VymwcF=PwKLdwFRxwHpp_-Q@mail.gmail.com> <CAKD1Yr3Fhnx3XaXouK57gupGOzodKGb0quhQxaf76NjWxSp3WA@mail.gmail.com> <CADhXe51MUB-czeCtpc63E0cHPpb_39Vv0o2Y57EVU2w_makP5Q@mail.gmail.com> <CAD6AjGTcKgK8W+VB1H5EQpHaYiKVYXqOz_2RS-w_CiTf9kL2CQ@mail.gmail.com> <CADhXe530+OVZrFZVaYh1-zoRDvJhUd0rf4sx6a2nO8SvKmm6zg@mail.gmail.com> <CAPi140PQ+TF0rED_bQPeS=Fj415qt0-zE2RdGnEL34PAzHyx6Q@mail.gmail.com> <CAD6AjGTjXAeMF6pw5MO2Jrf9B8LJ48D3m1YTVkdBe=_OHjtroQ@mail.gmail.com> <CADhXe51TCqU2eMP4LS3DooZxQDAPD95OVJDXbiU7qvuvKCMq+w@mail.gmail.com> <CAKD1Yr2=zc57+pOA9TFs+0azw0ZR1g67+08T=9eZPHjGXBvgFQ@mail.gmail.com> <CADhXe53T_30pj7xxwNs=mWEnd=do6oiq3KgN=U-gHLrLF-gG7Q@mail.gmail.com> <D1441574.4C168%wesley.george@twcable.com> <CAD6AjGQrzoBJrqQfKO0N8Ji=oJ-ZP6Sn88sXf=opJ6bYVmTDZg@mail.gmail.com> <CADhXe51MjVbsW512dSJqFpQUH44ZLazh=gkwD0mWwjw3=wqtUw@mail.gmail.com> <CAKD1Yr01qXwi=dN3Wdv1YPPDqCWG2nHyM=_Dhmh7BD+h6HsEwg@mail.gmail.com> <CADhXe50W0e5-k2Xa2GoLx2LBn77aXdzJ7GnEvA=M1RACaj+z6w@mail.gmail.com> <CAD6AjGSUpqvqih5cF7V8wEQU3W52Vm6_cp6b6i6VLJzkDTNeLw@mail.gmail.com> <CADhXe50M2rf14sB3Gv9BYA9invjo4CebebS6FR6dBvck4xNYaQ@mail.gmail.com>
Date: Sat, 04 Apr 2015 06:02:18 -0700
Message-ID: <CAD6AjGR0zo2p1Lo1_FCcpdSq4t696hJgcyxfMPBWcga_5kGt+A@mail.gmail.com>
From: Ca By <cb.list6@gmail.com>
To: James Woodyatt <jhw@nestlabs.com>
Content-Type: multipart/alternative; boundary="047d7bfd028cbaecf80512e5ac04"
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/m44oTJv-CBpbW098js6VRYQIymQ>
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] The need for local-ipv4 socket transition solutions -- NAT64/DNS64 remains insufficient
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Apr 2015 13:02:22 -0000

On Friday, April 3, 2015, James Woodyatt <jhw@nestlabs.com> wrote:

> On Fri, Apr 3, 2015 at 4:23 PM, Ca By <cb.list6@gmail.com
> <javascript:_e(%7B%7D,'cvml','cb.list6@gmail.com');>> wrote:
>
>>
>> The fundamental issue is that you have no control over these on the
>> internet, ipv4literals | tmoipv6
>> <https://sites.google.com/site/tmoipv6/ipv4literals>
>>
>
> That list is badly out of date.
>
>
It is only a few weeks old.


> (For grins, I looked at some entries on the list. The first one I looked
> at was at nodejs.org which has an IPv4 literal in its pre-formatted
> example code on the first page. Which I would note is example code that
> WOULD NOT BREAK in the absence of a CLAT. You'd have to remove the IPv4
> stack completely from the host to break it. The second one I looked at was
> the one at the top of the list. There is one IPv4 literal in the page. It's
> assigned to an unused Javascript variable. The third one I looked at was
> the second one on the list, which appears to have moved entirely since this
> list was created. Please update the list.)
>
> But put that aside for now. There aren't many people in this discussion
> who DO have control over the entries in that list, but Internet service
> operators certainly have more influence over them than anyone outside of
> the actual site owners. Tremble at the risk entailed in using your
> influence if you must, but don't complain that you have no influence at
> all. You can choose to get them to stop using IPv4 literals by taking away
> the free lunch. Or you can choose to let them run wild without consequence.
> Just start moving select populations of CLAT-less users to IPv6-only+NAT64
> networks. They'll figure it out pretty quickly.
>
>

This is 0% executive leaders from the customer service, network operations,
marketing, or regulatory affairs would approve such a move. Seriously, the
only viable path for that is if the government required it.


> You, and i, also have no control over what is implemented in signalling
>> channels. Your sockets my be AF agnostic, but that does not stop the data
>> structures for peer to peer apps being ipv4 addesses like Bittorent or
>> Skype use. [...] In fact, Skype works on iOS today on IPv6-only.... why?
>> Because they built a CLAT into the App.
>>
>
> Ah yes, those pesky IPv4-only P2P applications. Especially the ones with
> DHT keys containing IPv4 addresses. Which can't be easily adapted to handle
> IPv6 address too. A scourge on the Internet those apps are. Exactly how
> many are we talking about? Besides Skype and BitTorrent, I mean. Oh wait.
> They're already IPv6-capable. So, who *are* we talking about today?
>
>


It is a horrible idea of ask all the app vendors to invent their of unique
>> CLAT.  Because they have already reacted to the threat of IPv6-only... and
>> this is what they do.
>>
>
> Well, we aren't asking *all* the app vendors to do that, are we? Just the
> ones that are so amazingly clever they can't do the simple straightforward
> obvious thing, which is to change their protocols to not use IPv4 literal
> addresses.
>
> I simply don't see the downside of telling whatever remaining IPv4-only
> P2P app vendors are out there that they have to implement their own UNSAF
> mechanism over IPv6 rather than rely on the system to do it for them. Who
> knows, for many of them, it might not be that hard to just upgrade their
> protocols to support the dual-stack IPv4/IPv6 public Internet. That it was
> hard for Skype, but not very hard at all for FaceTime, seems like a
> relevant point to keep in mind.
>
>
>
Hard  or not, FaceTime requires IPv4 the last time I checked.

-- 
> james woodyatt <jhw@nestlabs.com
> <javascript:_e(%7B%7D,'cvml','jhw@nestlabs.com');>>
> Nest Labs, Communications Engineering
>