Re: [v6ops] IPv10 Discussion in v6ops

Khaled Omar <eng.khaled.omar@outlook.com> Mon, 14 September 2020 18:07 UTC

Return-Path: <eng.khaled.omar@outlook.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80F3F3A0D4E for <v6ops@ietfa.amsl.com>; Mon, 14 Sep 2020 11:07:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=outlook.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ILTsZFsoO_BP for <v6ops@ietfa.amsl.com>; Mon, 14 Sep 2020 11:07:41 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-oln040092072100.outbound.protection.outlook.com [40.92.72.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 858F63A0A25 for <v6ops@ietf.org>; Mon, 14 Sep 2020 11:07:40 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Or1qIhL3Q0z/NMR3idSS9dRSJ+6t4Bb2/WyFAe27mDpOtNUxmf/IGOdymHdnghBqVs2H9wY5YejjzoedOR6CrtQ3sGNFBcf7TgHgkecSBea17EydDAIWRxUUlz9lLAUOPmthRIf+dy095Mpb69Vo0I+j9YewBmPk7CYw/qvlA84WgR2cprWhlzpzBjRx7GwoVjo1U0qr+n7ROjhT4VSw/yxllNniCBeoFr/kTnOk/0SMjgeNl2qB0esGp2XhmpYML/2QN0NGqAFOeXdg/hm7B/6ZsLcV/KA0TjTQ46S+svvpvPzqwTRSMXlLws2O0jn3wkBJP5FULz2GuVg2qs2G9Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=doZoTi4BHcWmI1z0wexpD68fBJamjrAYk7mQRZAd0Rg=; b=ca4qp50rnqDPOVbol9t95KWg5MOsq1NZGUwuvaAl2xx23/tmhKRVF3guoUycI7LFSYa227w9QzU2GHvqnsXn1otLnLSV4bCpcLvgFO+WGGWJkjaJ0hNaH/VVbSQ+ru8xK74GVe+Krxw5G0G3wEHQpNp7GsfEABw3WibAZCFTWL1exo5JpDkwvmB3ypbVnElJQsuyVvQe09EUS2MDUg4a8I8e0/eQmQvGKtFtMDnQsrO3z2LEpzPqSzS+baQoYy5S2YwajwmG//B9ImFpOYbECc0ejNtRj77snYk/rVNTUICvWph81EjrqtlQkfhudKzke9tziBNMNPOPcMWDJFmttw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=doZoTi4BHcWmI1z0wexpD68fBJamjrAYk7mQRZAd0Rg=; b=O4L2uH0pHWs42gg+Na1zZF4Ihzf1m5G75VQXJaB82yYFkaMb0O604DT0hzRh3MT23X64ts9Tzl5q176IahNpPbMtgBqLBT82qCVizI98hU8k6UfpXUlDUxD/hsD43VxLeZiHbj18OxpW+0TbsVQDujDOiCv+kJ60jLhsSa19qsMqYJQrKuRgym2suvhFoAXTs9rqMu1bwuYu/w9sV4lSl6JzXUvYH55Vml/Yz6wmtyARcKYpKV8Z4Fne/XyeRfPblN0TbA0O1BUoskw+qDJ3NXhvChv1q86veBRysgLQlb565GOGZm30gk5WZcN4tX7IpkyhbzNae5J+FsQ0lx0QjA==
Received: from DB5EUR03FT032.eop-EUR03.prod.protection.outlook.com (2a01:111:e400:7e0a::47) by DB5EUR03HT086.eop-EUR03.prod.protection.outlook.com (2a01:111:e400:7e0a::326) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3370.16; Mon, 14 Sep 2020 18:07:37 +0000
Received: from VI1P194MB0285.EURP194.PROD.OUTLOOK.COM (2a01:111:e400:7e0a::51) by DB5EUR03FT032.mail.protection.outlook.com (2a01:111:e400:7e0a::162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3370.16 via Frontend Transport; Mon, 14 Sep 2020 18:07:37 +0000
Received: from VI1P194MB0285.EURP194.PROD.OUTLOOK.COM ([fe80::89f6:7540:e834:ffb8]) by VI1P194MB0285.EURP194.PROD.OUTLOOK.COM ([fe80::89f6:7540:e834:ffb8%5]) with mapi id 15.20.3370.019; Mon, 14 Sep 2020 18:07:37 +0000
From: Khaled Omar <eng.khaled.omar@outlook.com>
To: Nick Hilliard <nick@foobar.org>
CC: "v6ops@ietf.org" <v6ops@ietf.org>
Thread-Topic: [v6ops] IPv10 Discussion in v6ops
Thread-Index: AQHWiT43LYhHc7LQV0ie1xfS7y0F1aloGfGQgAAENwCAAAu+gIAAAGeQgAAHggCAAAB2MIAADOUAgAAAavCAABNRgIAAAvEAgAADUYCAAAC1YIAAEYsAgAADLCA=
Date: Mon, 14 Sep 2020 18:07:37 +0000
Message-ID: <VI1P194MB02857724058D5192BD8E3BADAE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM>
References: <159985752195.15551.2657932726923781035@ietfa.amsl.com> <3FA82C44-0005-45BA-AB09-FAE63C8CD626@gmail.com> <VI1P194MB028561F81F5118ABC14967DFAE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <3B5995B1-CD7A-444C-AD64-37C09E46A763@thehobsons.co.uk> <4fa01d01-bc2e-0f01-77f1-13dd4f6f2430@hit.bme.hu> <VI1P194MB0285FCDBFB6A86DF954D1782AE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <e0e4e5cf-1563-fca1-1388-68c8789384de@nlogic.no> <VI1P194MB0285090A6E66464C9612EE34AE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <a461b63d-acfc-dd07-61e4-04f38ac85c95@nlogic.no> <VI1P194MB0285F92EB7A41638CCD943BFAE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <f149036e-6f14-259d-66a7-6f9c6ff92207@boeddinghaus.de> <VI1P194MB02850F23AF935024E5281F15AE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <CAHw9_iKE0KHbM0BD8HSc3xxeUDeeWbRvrH-Kfxn_7a8fi72hQA@mail.gmail.com> <VI1P194MB0285958CAA801F8C915B81D0AE230@VI1P194MB0285.EURP194.PROD.OUTLOOK.COM> <c5eecbd3-2416-a132-39f1-4a35d2debf56@foobar.org>
In-Reply-To: <c5eecbd3-2416-a132-39f1-4a35d2debf56@foobar.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-incomingtopheadermarker: OriginalChecksum:E31D586E5AB1FCAD51169856CFDF41A91D6AE03C3CD5B29F31ED18C8FE8CAFEC; UpperCasedChecksum:01EDCAA9F8D0D164E87F385FB48C4A8F49CD24C85F8A17B240286041CF9DAECF; SizeAsReceived:3713; Count:43
x-tmn: [Iw0LoIvSQtgzSaSkJtluiP9DEtSrU2TE]
x-ms-publictraffictype: Email
x-incomingheadercount: 43
x-eopattributedmessage: 0
x-ms-office365-filtering-correlation-id: 9e8ef037-5dfb-44c3-6ded-08d858d91049
x-ms-traffictypediagnostic: DB5EUR03HT086:
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: NxAakoQJ4BmqWM4R411qX7pEvq40GODzyntvOLvKoioAvySK4WefO+/LNxPX1o4nIh2x5etaG9AgP8WmJ7P4xXhF4VxH5nCStlhfukuIuGIMwsAjMZDHAIukS78DJhVULHfFOoqTBrfLiRZmLMDHi7p85l2eZzhej20VlZBnw+Sb+bkwaa6eUvXTnAo8g8UD
x-ms-exchange-antispam-messagedata: PgYXj/UpwtVSXADF8kvoAYfICxxBuciazdeudnaps/AMtCYJ/l3FnT+WN09S4vFabhF16nx7Gpye+E/8Eh+UwHjcJm36M6dkCiM9zofE2SR8WQgEh0ckOmH8ghOpkuZGHWaVupUjYl4tqcNwIM4lkQ==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: 9e8ef037-5dfb-44c3-6ded-08d858d91049
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2020 18:07:37.6980 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Internet
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB5EUR03HT086
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/mD6qAUOW8KQs3lwkwV39PlKPYrw>
Subject: Re: [v6ops] IPv10 Discussion in v6ops
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Sep 2020 18:07:42 -0000

Hi Nick and ALL,

>> 1. write a working implementation of "ipv10".  Or even a proof of concept which allows a single application to make a single connection over "ipv10" to another ipv4 or ipv6 host on another network.

Are you sure you read all the draft, it has examples on Layer 3 that IPv10 will only work on, there are no more possibilities than the 4 mentioned on the draft.

>> 2. update the specifications for other protocols to support "ipv10", e.g. routing protocols: BGP, mpls, OSPFv2, OSPFv3, ISIS, etc.  There are at least 500 RFCs for these protocols alone, so why not take just a small selection and update them to support "ipv10".  If you wrote a working implementation, then that would be even better.

First we need to finalize the work on this one, then we can think about what are other protocols that needs to have an EXTENDED update to adapt with IPv10.

I can see a light at the end of the tunnel but there should more participation to use all experiences and GAIN consensus.

>> It's no use to say that you're not a programmer and that it's someone else's job to write the code for your ideas. People have made it clear that they think your ideas won't work, so if you want your ideas to be taken seriously, then it's your responsibility to prove them wrong.

People didn't offer another practical solution, the problem is clear, and people are putting their faces inside the ground and they think everything is fine, which is not the truth.

This is really weird that there is no official administrative decision to explain the problem and the solution (that comes from anywhere) whether here on the list or the news to answer all people concerns.

>> It's also useless to argue endlessly that people should take your ideas seriously.  People won't take them seriously unless you can show that they actually work in real life.

Since I've been working with many nationalities (like Australians, Deutsch, Egyptians, and many more) and after a good time I can say that it is a matter of choice to choose the people you need to work with, that’s why I say who is interested, can join the discussion and the standardization process and will gain more experience.

Khaled Omar

-----Original Message-----
From: Nick Hilliard <nick@foobar.org> 
Sent: Monday, September 14, 2020 7:46 PM
To: Khaled Omar <eng.khaled.omar@outlook.com>
Cc: v6ops@ietf.org
Subject: Re: [v6ops] IPv10 Discussion in v6ops

Khaled Omar wrote on 14/09/2020 17:45:
> I don’t know why people are still lazy and preferring the easy way 
> which is to keep waiting and see maybe something new will happen, IMHP 
> enough time to wait and we should work on something already existing 
> to solve the problem completely.

Khaled,

There have been hundreds of emails over the last couple of years written by people who've looked at your proposals and who have unanimously come to the same conclusion:

	None of your proposals are going to work.

So when you ask an IETF working group to work on your proposals, you're asking people to spend time on something they think is not going to work.

If you want the IETF to take your ideas seriously, then you need to prove to people that they're going to work.

A good way to start would be to listen to what people are saying, and fix some of the more serious problems that people have patiently taken time to comment on.

Here are some ideas:

1. write a working implementation of "ipv10".  Or even a proof of concept which allows a single application to make a single connection over "ipv10" to another ipv4 or ipv6 host on another network.

2. update the specifications for other protocols to support "ipv10", e.g. routing protocols: BGP, mpls, OSPFv2, OSPFv3, ISIS, etc.  There are at least 500 RFCs for these protocols alone, so why not take just a small selection and update them to support "ipv10".  If you wrote a working implementation, then that would be even better.

3. write an API specification for host applications to handle dual addressing.

4. write an implementation of your "routing protocol" which allows one network to exchange routing information with another network.  Pro tip: 
make sure it works over "ipv10".

It's no use to say that you're not a programmer and that it's someone else's job to write the code for your ideas. People have made it clear that they think your ideas won't work, so if you want your ideas to be taken seriously, then it's your responsibility to prove them wrong.

It's also useless to argue endlessly that people should take your ideas seriously.  People won't take them seriously unless you can show that they actually work in real life.

When you've written code to show that your ideas work then come back to the IETF and maybe at that stage people will take your ideas more seriously.

Nick