Thought I'd toss in my two cents on IETF vs. what most of us are doing, since I deal with standards all the time, and regularly interact with some well funded research groups that play in the same space.

IMHO one of the ways in which the IETF protocols are far less interesting in practice is their desire to use many standard protocols together as the 'correct solution' instead of stepping on each others turf and trying to combine them. As listed below - STUN + ICE + SIP + ... Add the complexity and ambiguity of the specifications, lack of quality, unencumbered reference implementations, and contrast it with the elegance possible if you simply learn from these protocols and assemble your own that borrows the best of each.

I faced this same dilemma when building my current transport protocol engine - I needed DOS resistance (client puzzles) right up front, ECDSA with one and two way cert exchange, session key management, encryption + MAC, all over UDP with parallel virtual channels with different delivery options per channel ranging from unguaranteed to ordered/guaranteed and with delivery notification options. Add NAT management on top (STUN, relays, ect.)

Do you know how many IETF protocols I would had to bolt together to get most of that feature set, and how big and complicated the resulting codebase would be? And a simple requirement like client puzzles up front breaks most standards, in any case, as does a simple requirement to operate over a single random port number.

This is one of the biggest reasons why most of us roll our own. The IETF groups are performing great research in their niches, but the protocols themselves are rarely useful outside of their testbeds. On the other hand, they make great reference reading, to see what use cases and solutions the researches have documented, especially when those use cases match data we've collected from the field.

Kerry Bonin


David Barrett wrote:

I disagree with Michael's assessment of the motivation of IETF participants; everybody I've met appears to have the best of intentions.

My concern is the real world always seems like an unwelcome guest in IETF discussions, and I constantly feel like an ass for harping on things like data, implementations, actual use cases, etc.

Regardless, I'm eager to hear your (forgive me) real-world results implementing the IETF P2P stack (STUN/ICE/SIP/etc). The proof is in the pudding, so let's eat!

-david

------------------------------------------------------------------------

*From:* [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] *On Behalf Of *Adam Fisk
*Sent:* Wednesday, September 12, 2007 10:11 AM
*To:* theory and practice of decentralized computer networks
*Subject:* Re: [p2p-hackers] Best NAT traversal options

Right. I forgot I'd seen you over on some of those lists. I'm surprised you participate if you think it's all about commoditizing the competition or gumming things up, though. Which one are you doing? Joking joking.

No, I agree the IETF has problems, but some standard emerging out of the p2p hackers list sure would scare me a lot more!

-Adam

On 9/5/07, *Michael Slavitch* <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:

For those that need help with that, try this:

http://www.google.com/search?&q=slavitch%20IETF <http://www.google.com/search?&q=slavitch%20IETF>

On 9/5/07, Michael Slavitch < [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:
> Yes, I know about the IETF.   Google is your friend.
>
>
> On 9/5/07, Adam Fisk <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:
>
> > Do you know many people who work in or with the IETF? Have you worked with > > the IETF? I'm sincerely asking, because I would be surprised if you had and > > continued to hold your views. They make decisions by "taking a hum" for > > Christ's sake -- similar the yeahs and the neighs (sp?). These people are
> > the enemy?  To me, it's a miraculous example of cooperation amongst
> > frequently competing interests.
> >
> > -Adam
> >
> >
> >
> > On 9/5/07, Michael Slavitch <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:
> > >
> > > "The IETF is really not so different from this list -- a bunch of
> > > people getting together to make stuff work."
> > >
> > > Not so sure about that.
> > >
> > > The goal of participating in a standards body to either make things
> > > work to commoditize the competition or gum things up so that they
> > > never work, are horrendoes to implement, thereby creating barriers to
> > > entry that only you can exploit.
> > >
> > > Look at IMS, for example.
> > >
> > > How easy is it to get ICE working, and I mean >working<, not "working".
> > >
> > > How long has it taken to develop and finalize?
> > > _______________________________________________
> > > p2p-hackers mailing list
> > > [email protected] <mailto:[email protected]>
> > >
> > http://lists.zooko.com/mailman/listinfo/p2p-hackers
> > >
> >
> >
> > _______________________________________________
> > p2p-hackers mailing list
> > [email protected] <mailto:[email protected]>
> > http://lists.zooko.com/mailman/listinfo/p2p-hackers <http://lists.zooko.com/mailman/listinfo/p2p-hackers>
> >
> >
>
>
> --
> Michael Slavitch
> Ottawa Ontario Canada
>


--
Michael Slavitch
Ottawa Ontario Canada
_______________________________________________
p2p-hackers mailing list
[email protected] <mailto:[email protected]>
http://lists.zooko.com/mailman/listinfo/p2p-hackers <http://lists.zooko.com/mailman/listinfo/p2p-hackers>

------------------------------------------------------------------------

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to