Re: [v6ops] Operational Consensus on deployment

Owen DeLong <owen@delong.com> Tue, 05 August 2014 15:17 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EE621B289E for <v6ops@ietfa.amsl.com>; Tue, 5 Aug 2014 08:17:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.992
X-Spam-Level:
X-Spam-Status: No, score=-0.992 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_ALL=0.8, DKIM_SIGNED=0.1, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yX-IVERcxjF0 for <v6ops@ietfa.amsl.com>; Tue, 5 Aug 2014 08:17:12 -0700 (PDT)
Received: from owen.delong.com (owen.delong.com [IPv6:2620:0:930::200:2]) by ietfa.amsl.com (Postfix) with ESMTP id ED0C41B289A for <v6ops@ietf.org>; Tue, 5 Aug 2014 08:17:11 -0700 (PDT)
Received: from [10.0.0.11] (ip72-199-16-177.sd.sd.cox.net [72.199.16.177]) (authenticated bits=0) by owen.delong.com (8.14.2/8.14.2) with ESMTP id s75FBCN6005565 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Tue, 5 Aug 2014 08:11:13 -0700
X-DKIM: Sendmail DKIM Filter v2.8.3 owen.delong.com s75FBCN6005565
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=delong.com; s=mail; t=1407251474; bh=YKVL6GvvhEHEX/Na3TBNs4l5ujU=; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc: Content-Transfer-Encoding:Message-Id:References:To; b=nzNJCfCdzvJdW/hioBA7EkM4h2FkUnij+rcyifxqHXktxAJQyChsQJFAcMIFH9TFv GbuTSpOdo7HPRW1uIpXxSYKZVBSWrFA8SaR+5Rfe2ReWldaY/BDXS3VwDy99qKx7Ho +nI9fs1OdIkzZ2HLuKIYoRoVl4ICp6JR1JqDjQVo=
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Owen DeLong <owen@delong.com>
In-Reply-To: <alpine.DEB.2.03.1408050854200.19219@iskra.ottix.net>
Date: Tue, 05 Aug 2014 08:11:07 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <42E9089E-CA04-418F-8B23-D89BB1452D86@delong.com>
References: <256EAE0B-5C11-42C7-BCA1-CEC7EE6713A7@cisco.com> <53DFD634.4020304@fud.no> <DE860EBC-171E-46E7-A3B6-5E8B79A453CC@cisco.com> <53DFEC6C.3010707@gmail.com> <CAD6AjGRUWxT5XiNxMi_S5VgYtGMLb_FVHXN-ZfGpcY=geix15g@mail.gmail.com> <53E06AC9.9010908@fud.no> <alpine.DEB.2.03.1408050854200.19219@iskra.ottix.net>
To: "William F. Maton Sotomayor" <wmaton@ottix.net>
X-Mailer: Apple Mail (2.1878.6)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0rc1 (owen.delong.com [192.159.10.2]); Tue, 05 Aug 2014 08:11:14 -0700 (PDT)
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/y7koKkeGw2TEMXiZJmXu4vd28qs
Cc: IPv6 Ops WG <v6ops@ietf.org>, Tore Anderson <tore@fud.no>
Subject: Re: [v6ops] Operational Consensus on deployment
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Aug 2014 15:17:13 -0000

On Aug 5, 2014, at 5:56 AM, William F. Maton Sotomayor <wmaton@ottix.net> wrote:

> On Tue, 5 Aug 2014, Tore Anderson wrote:
> 
>> * Brian E Carpenter
>> 
>>>> (In parenthesis, I've never seen sunsetting IPv4 as a real problem.
>>>> One day somebody will notice that there are no more IPv4 packets. But
>>>> that is many years in the future.)
>> 
>> The thing is, if you've built your infrastructure on IPv4, removing it
>> is going to be a royal pain in the arse. Even if all the IPv4 users have
>> left the public internet, if your application server speaks to your
>> database server over IPv4, and the database server speaks to the iSCSI
>> array over IPv4, and so on and so on, then you're simply not in a
>> position to easily shut IPv4 off.
> 
> Worse still is all the gear to workaround NAT, so it isn't just the usual suspects of desktops vs servers vs appilcations, but also the point-to-point setups (video conferecing comes to mind) I have encountered that require going around NATs.

Once the video conferencing setup is running over IPv6, will it care if you remove the IPv4 NAT workaround infrastructure?

Perhaps I am confused.

> 
> (There is something to be said about a net gain in maintenace overhead in elminating some of that, but there's also the effort to remove it and test, etc.)

As a general rule, once nothing is depending on something, removing it is usually fairly quick and painless, often accompanied with much celebration and the consumption of adult beverages with bubbles in the case of perpetually painful legacy infrastructure like NAT gateways and NAT workarounds.

The hard part is getting all that other stuff that depends on such infrastructure to the point that it depended on such infrastructure (past tense), but no longer does.

Owen