Re: Non routable IPv6 registry proposal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Fernando Gont wrote:

I'd have agreed with you. BUt since draft-ietf-spring-srv6-network-programming has been approved by the
IESG, you probably cannot make such assertion anymore.

One draft that doesn’t update or obsolete numerous others does not undermine 40 yrs of E2E.

Esp. when (AFAICT) that doc series never mentions how transport protocols are supposed to deal with indeterminate endpoint addresses  in their pseudo headers or the impact to security protocols at the transport (not transport content) layer.

One *internet-draft* certainly doesn't undermine E2E. However, I guess
that an *RFC* published as a "Proposed Standard" probably does (undermine) E2E? -- (draft-ietf-spring-srv6-network-programming has been approved by the IESG).

Wrong.

That the draft state "any complex user-defined behavior" means
it is subject to incompleteness theorem applicable to any
system complex enough to be able to handle natural numbers, which
means its behavior can not be fully reversed by external systems
to restore the E2E transparency even though its behavior is
formally fully described, which means the E2E principle can
not be kept regardless of whatever random things IESG might
have stated.

It is *VERY* well known that powerful formal description can not
fully analyzed mechanically, which is the incompleteness theorem.

So, the draft or PS or whatever is totally broken. Just ignore
it along with people who are working for it.

The only formal system fully analyzed mechanically is finite
state systems.

So, if there is similar draft but only applicable to "behavior
only as complex as to be represented by finite state automaton",
the draft may be valid, but, such representation is so poor to
be useful.

						Masataka Ohta

PS

The situation has been obvious when deoccifying was mentioned by
IAB, which means most, if not all, of them do not understand the incompleteness theorem.

PPS

E2E transparency can be fully restored by end systems, even if it
is disturbed by intermediate systems, if, and only if, the end
systems not merely have formal description of the intermediate
systems but can actively and properly interact with the intermediate
systems to control actively their internal activities.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux