That's a fun question. I took this approach based on my operating assumption 
that 7050 is still useful to some folks (noting 7050 is also still in the CLAT 
recommendations draft Jen and I are writing). I wouldn't be opposed to writing 
a deprecation instead if consensus indicates 7050 is no longer needed.

One use case could be 8781 is harder for apps above the networking stack to 
read, which applies to NAT64+DNS64 in the absence of 464XLAT and apps that are 
IPv6 aware trying to reach IPv4 only destinations. I might be tossing a match 
into fuel here, but to answer your question, I think we need to first answer 
"what is our recommended story for IPv6-aware apps communicating with IPv4-only 
peers when the OS gives it no IPv4 address or CLAT?"

There may be other use cases for 7050 that 8781 can't meet, but I'll let others 
speak up if they want for those. I certainly have a PREFerence for 8781.

Thanks,
Tommy
________________________________
From: Brian Candler <br...@nsrc.org>
Sent: Wednesday, June 26, 2024 12:21 AM
To: Tommy Jensen <jensen.tho...@microsoft.com>; dnsop@ietf.org <dnsop@ietf.org>
Cc: V6 Ops List <v6...@ietf.org>
Subject: Re: [v6ops] Re: [EXTERNAL] New Version Notification for 
draft-jens-7050-secure-channel-00.txt

On 26/06/2024 06:50, Tommy Jensen wrote:
> I am seeking feedback on whether updating 7050 is the correct
> approach, and more generally, if there's interest in taking up work in
> the area of "revisiting how a stub resolver should secure its
> communication with a DNS64 resolver".

With the PREF64 mechanism (RFC8781) already seeing widespread adoption,
are we at a point where we could simply deprecate RFC7050?

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to