Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?

Philip Homburg <pch-v6ops-3@u-1.phicoh.com> Tue, 10 November 2015 11:51 UTC

Return-Path: <pch-bBB316E3E@u-1.phicoh.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27CDA1A87BD for <v6ops@ietfa.amsl.com>; Tue, 10 Nov 2015 03:51:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NveNMAemyqio for <v6ops@ietfa.amsl.com>; Tue, 10 Nov 2015 03:51:01 -0800 (PST)
Received: from stereo.hq.phicoh.net (stereo6.hq.phicoh.net [IPv6:2001:888:1044:10:2a0:c9ff:fe9f:17a9]) by ietfa.amsl.com (Postfix) with ESMTP id 7B4841A1A8C for <v6ops@ietf.org>; Tue, 10 Nov 2015 03:50:59 -0800 (PST)
Received: from stereo.hq.phicoh.net (localhost [::ffff:127.0.0.1]) by stereo.hq.phicoh.net with esmtp (Smail #91) id m1Zw7Rx-0000CoC; Tue, 10 Nov 2015 12:50:57 +0100
Message-Id: <m1Zw7Rx-0000CoC@stereo.hq.phicoh.net>
To: v6ops@ietf.org
From: Philip Homburg <pch-v6ops-3@u-1.phicoh.com>
Sender: pch-bBB316E3E@u-1.phicoh.com
References: <D25D5920.C914E%Lee.Howard@twcable.com> <5637FDD0.70300@jvknet.com> <D25E32F1.C9507%Lee.Howard@twcable.com> <CAKD1Yr1VvzkSmJo3hu6t_3CUguLN_UkNZjRUqvU_ygPBTyb+8g@mail.gmail.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C2319739@nkgeml506-mbx.china.huawei.com> <CAKD1Yr3g-ZV+MkbtDrusbtYaZ_wmCxDG9XbT25Ldma4koGpV6A@mail.gmail.com> <D25E7DDF.C9709%Lee.Howard@twcable.com> <CAKD1Yr3Vsn7Ny_xSCr_=sVCHyU+=ZrRh2iQDUPx-5FWdHajv2w@mail.gmail.com> <D2614A6A.CA099%Lee.Howard@twcable.com> <563B9D1E.4030606@umn.edu> <D261FE8E.CA1FB%Lee.Howard@twcable.com> <CAKD1Yr3jip0NBkDxg=MvgZXg0LMS+PtREDw2jSRx0xJLqHwhGQ@mail.gmail.com> <563C7C01.6010703@foobar.org> <CAKD1Yr1rKjkDhhuD9L=R_MJ+ofOAZ2Nt+5mszZKQxCh-kH4vqw@mail.gmail.com> <563F3AC3.6000205@foobar.org> <m1ZvVwA-0000CLC@stereo.hq.phicoh.net> <563FC756.5090906@foobar.org> <m1ZvZ4v-0000CeC@stereo.hq.phicoh.net> <56410A97.7050508@isi.edu>
In-reply-to: Your message of "Mon, 9 Nov 2015 13:05:27 -0800 ." <56410A97.7050508@isi.edu>
Date: Tue, 10 Nov 2015 12:50:55 +0100
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/vktAw82zhurtYNTpkpLATpY5x0A>
Subject: Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2015 11:51:03 -0000

>> Call me old fashioned, but what NAT breaks is not what is traditionally
>> called a protocol layering violation. (The TCP checksum is one of the classical
>> layering violations in the IP protocol stack)

>Given that a NAT breaks the TCP checksum (which depends on the IP
>pseudoheader and TCP header) and thus has to recalculate it, wouldn't
>that be proof that a NAT breaks what you consider protocol layer violation?

If a layering violation like in TCP gets broken by NAT, then I consider
that fair game. I.e., such layering violations should not exist in the
first place, so it is TCP that is broken.

>On 11/8/2015 3:08 PM, Philip Homburg wrote:
>>> ddns is also a layering violation because it makes an assumption at layer 7
>>> >about what's going on in layer 3.
>>
>> Again, we have to use transport layer identifiers, because the IP stack
>> doesn't define anything else.
>
>Note that some protocols do define other identifiers, e.g., HTTP uses URNs.
>
>We often use L4 identifiers when there are no other upper layer
>end-to-end identifiers available, e.g., the app uses 128.9.160.161:80
>because that's what the user provided. The fact that these are L4 (or
>L3) identifiers is true only because the addresses got passed down
>through the stack - which is definitely not layer violation.

Commonly used URNs rely on transport layer addresses (which are broken by
NAT) or DNS, which is also broken by NAT (in some cases).

One way of looking at NAT is that it deals with a failure of IP addressing.
In the case of IPv4, with the fact that 32 bits is just not enough.

And in IPv6 most likely in cases where the locator/identifier split is not
in the architecture. 

I.e. NAT breaks the model because it is a fix where the model is broken.