> Cc: NANOG <[email protected]>, Greg Skinner <[email protected]>, 
> "Karandikar, Abhay" <[email protected]>, Rama Ati <[email protected]>, 
> Bob Corner GMAIL <[email protected]>, "Hsing, T. Russell" 
> <[email protected]>, "Chen, Henry C.J." <[email protected]>, ST Hsieh 
> <[email protected]>, "Chen, Abraham Y." <[email protected]>
> 

This is a whole lot of cc:s to people who aren't even part of this group/list.  
One wonders with this many cc:s, how many bcc:s there also were, and to whom.

Anne

--
Anne P. Mitchell, Attorney at Law
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email marketing law)
Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Legal Counsel: The CyberGreen Institute
In-house Counsel: Mail Abuse Prevention System (MAPS) (Closed in 2004)


> On Mar 8, 2022, at 8:46 AM, Abraham Y. Chen <[email protected]> wrote:
> 
> Hi, Tom:
> 
> 0)    Thanks to your thoughts.
> 
> 1)    First, logistics: Since this was my first post to this Forum, I got an 
> auto-response stating that my post was being moderated. Then, I got your 
> message even before I received any follow-up notice from such, nor my writing 
> being published. Are you responding to the general distribution or acting as 
> a moderator?
> 
> 2)    " .... an overly convoluted mechanism to tunnel 240/4. ....    ":    We 
> started our work due to curiosity. As we made progresses in various areas, 
> quite a few topics have distilled to a different yet much clearer picture. 
> Allow me to describe the current EzIP proposal with respect to these aspects: 
>   
> 
>     A.    "overly convoluted":    EzIP proposes to make use of the 
> long-reserved 240/4 NetBlock by utilizing the RFC791 to carry it.  However, 
> this is only needed for the long term full end-to-end deployment. For the 
> immediate EzIP configuration that is for supporting the current Server / 
> Client (Master /Slave) model (similar to the current CG-NAT, or CDN), EzIP 
> will be using a degenerated configuration which we call it RAN (Regional Area 
> Network) where the standard IPv4 packet header will be suffice, even without 
> the RFC791. I believe these schemes are opposite to "convoluted".  
> 
>     B.    "tunnel":    Instead of tunneling in the current sense of 6to4 
> tunneling, or similar, which interacts with the parameters of transmission 
> environment, EzIP is an overlay network consisting of RANs (Regional Area 
> Networks), each is tethered from the current Internet via one IPv4 public 
> address. Since each RAN appears to be a private network to the Internet core, 
> pretty much everything in the RAN is independent of the latter.  Direct 
> communications between IoTs residing in separate RANs, when needed, will 
> still be carried by native IPv4 packets (with the addition of Option Words 
> carrying IoTs' Source and Destination addresses within the host RANs, 
> respectively).      
>     
>     Could you please clarify your characterizations of the above?
> 
> 
> 
> Regards,
> 
> 
> 
> 
> 
> Abe (2022-03-08 10:46)
> 
> 
> 
> 
> 
> On 2022-03-08 09:09, Tom Beecher wrote:
>> I recall reading the IETF draft some time ago. It seemed like an overly 
>> convoluted mechanism to tunnel 240/4. 
>> 
>> On Tue, Mar 8, 2022 at 8:50 AM Abraham Y. Chen <[email protected]> wrote:
>> Dear Colleagues:
>> 
>> 0)    I was made aware of a recent discussion on this Forum that cited our 
>> work on the 240/4 NetBlock, nicknamed EzIP (Phonetic for Easy IPv4). (Please 
>> see, at the end of this MSG, the URL to the discussion and the highlighted 
>> text where the citation was made.)
>> 
>> 1)    As the lead investigator of the EzIP Project, I would like to  
>> formally introduce our solution by bringing your attention to an overview 
>> whitepaper:
>> 
>>     https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>> 
>>     In a nutshell, EzIP proposes to disable the program codes in current 
>> routers that have been disabling the use of the 240/4 NetBlock. The cost of 
>> this software engineering should be minimal. The EzIP deployment 
>> architecture is the same as that of the existing CG-NAT (Carrier Grade 
>> Network Address Translation). Consequently, there is no need to modify any 
>> hardware equipment. There is an online setup description (Reference II), 
>> called RAN (Regional Area Network), that demonstrates the feasibility of 
>> this approach.
>> 
>> 2)    There are additional consequential benefits by deploying EzIP, such as 
>> those mentioned by our comment to Reference III in the above whitepaper.
>> 
>> I look forward to addressing your thoughts.
>> 
>> 
>> Regards,
>> 
>> 
>> 
>> Abe (2022-03-07 17:14 EST)
>> VP Engineering
>> Avinta Communications, Inc.
>> Milpitas, CA 95035 USA
>> +1(408)942-1485
>> Skype: Abraham.Y.Chen
>> eMail: [email protected]
>> WebSite: www.Avinta.com
>> 
>> 
>> ***********************
>> 
>> https://mailman.nanog.org/pipermail/nanog/2021-November/216766.html
>> 
>> Class D addresses? was: Redploying most of 127/8 as unicast public
>> 
>> Greg Skinner gregskinner0 at icloud.com 
>> Mon Nov 29 18:47:14 UTC 2021
>>      • Previous message (by thread): Class D addresses? was: Redploying most 
>> of 127/8 as unicast public
>>      • Next message (by thread): Class E addresses? 240/4 history
>>      • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
>> > On Nov 24, 2021, at 5:08 PM, William Herrin <bill at herrin.us
>> > wrote:
>> 
>> >
>>  
>> 
>> > On Wed, Nov 24, 2021 at 4:36 PM David Conrad <drc at virtualized.org
>> > wrote:
>> 
>> >>>
>>  I like research but what would the RIRs study? The percentage of the
>> 
>> >>
>>  
>> 
>> >> Lots of people said similar things when 1.0.0.0/8
>>  was allocated to APNIC
>> 
>> >> and they said similar things when 1.1.1.0/24
>>  was stood up as an
>> 
>> >>
>>  experiment by Cloudflare and APNIC, yet 1.1.1.1 seems to be pretty popular.
>> 
>> >
>>  
>> 
>> >
>>  Hi David,
>> 
>> >
>>  
>> 
>> >
>>  I don't recall there being any equipment or software compatibility
>> 
>> > concerns with 1.0.0.0/8
>> . If you do, feel free to refresh my memory. As
>> 
>> >
>>  I recall it, there were concerns with prior local use and potential
>> 
>> >
>>  trash traffic. It seemed likely those concerns could be addressed with
>> 
>> >
>>  experiments, and the experiments in fact addressed them.
>> 
>> >
>>  
>> 
>> >
>>  The prior local use worry reared its head again with 240/4 but given
>> 
>> > the prior experience with 1.0.0.0/8
>>  I don't personally believe we need
>> 
>> >
>>  to re-run that experiment just because the numbers are part of a
>> 
>> >
>>  different block.
>> 
>> >
>>  
>> 
>> >
>>  
>> 
>> >>
>>  Seems to me that a number of folks on this list and during this
>> 
>> >>
>>  discussion would disagree with a blanket assertion that 240/4
>> 
>> >>
>>  is “dysfunctional on the 2021 Internet” - some of them even
>> 
>> >>
>>  wrote a draft discussing the possibility.
>> 
>> >
>>  
>> 
>> >
>>  Line them up. Show of hands. Who really thinks that if we assign
>> 
>> >
>>  240.0.0.1 to a customer tomorrow without waiting for anyone to clean
>> 
>> >
>>  up their software and hardware, you won't get enough complaints about
>> 
>> >
>>  things not working that you have to take it back and assign a
>> 
>> >
>>  different address instead?
>> 
>> >
>>  
>> 
>> >
>>  
>> 
>> >>
>>  1. Move 240/4 from "reserved" to "unallocated unicast"
>> 
>> >>
>>  
>> 
>> >>
>>  OK, but this seems like a quibble.  The status for 240/4 is “
>> 
>> >>
>>  RESERVED: designated by the IETF for specific non-global-unicast
>> 
>> >>
>>  purposes as noted.”  The “as noted” part is “Future Use”.
>> 
>> >
>>  
>> 
>> >
>>  It's not a quibble. Some vendors take the current status to mean
>> 
>> >
>>  "treat it like unicast until we're told otherwise." Others take the
>> 
>> >
>>  status to mean, "packets with these addresses are bogons without a
>> 
>> >
>>  defined routing behavior until we're told otherwise." The result is
>> 
>> >
>>  incompatible behavior between vendors. Changing that direction to
>> 
>> >
>>  "treat it like unicast" without ambiguity is not a quibble.
>> 
>> >
>>  
>> 
>> >
>>  Regards,
>> 
>> >
>>  Bill Herrin
>> 
>> >
>>  
>> 
>> >
>>  --
>> 
>> >
>>  William Herrin
>> 
>> > bill at herrin.us
>> > https://bill.herrin.us/
>> 
>> For what it’s worth, I’ve been tracking this issue on other netops mailing 
>> lists.  There is a recent post on the LACNOG list from Leandro Bertholdo
>>  <
>> https://mail.lacnic.net/pipermail/lacnog/2021-November/008895.html> 
>> referencing 
>> https://datatracker.ietf.org/doc/draft-chen-ati-adaptive-ipv4-address-space/
>>  
>> <
>> https://datatracker.ietf.org/doc/draft-chen-ati-adaptive-ipv4-address-space/
>> >, a draft proposing another way to make additional IPv4 address space 
>> >available
>> I haven’t had time to read the draft closely, but I noticed that it involves 
>> the use of 240/4.  Subsequent googling about the draft turned up a 
>> presentation 
>> <
>> https://www.avinta.com/phoenix-1/home/RegionalAreaNetworkArchitecture.pdf> 
>> describing how the techniques described could be deployed.
>>   I noticed that the presentation 
>> made reference to OpenWRT, so perhaps the authors are aware of the work that 
>> the authors of the IPv4 Unicast Extensions Project have done in that area.
>> 
>> The adaptive-ipv4 draft will expire sometime next month, so anyone 
>> interested in seeing it move forward should contact the authors.
>> 
>> —gregbo
>> 
>> *******************
>> 
>> 
>>      Virus-free. www.avast.com
> 
> 

Reply via email to