125 pointsby EvanZhouDev2 days ago34 comments
  • timokoesters2 days ago
    This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D is not endorsed by the IETF and has no formal standing in the IETF standards process.

    https://datatracker.ietf.org/doc/draft-thain-ipv8/

    • stingraycharles2 days ago
      Yes, and assuming it will not become popular, this will expire / not renew in 6 months.

      It’s also worth noting that the author is affiliated with a company based in Bermuda. So it doesn’t feel like it comes from a legitimate institute. For all i know this was vibe-written by an AI in an afternoon.

      • 1vuio0pswjnm72 days ago
        "Founded in 1998, One Communications Ltd. (formerly KeyTech Limited) is a diverse telecommunications holding company. Its subsidiary companies specialise in cellular voice, high-speed internet, subscription television and data solutions for both residential and corporate customers.

        In 2014, One Communications Ltd. began a series of strategic mergers and acquisitions in order to position itself competitively in an industry driven by technological change. The Company acquired internet, cellular and cable television companies in both Bermuda and the Cayman Islands. These transactions have transformed One Communications Ltd. into a robust triple-play service provider with the networks and data access infrastructures needed to meet the demands of ever-growing bandwidth consumption. Through its operating subsidiaries, the Company is positioned as the leading full-service telecommunications provider for corporate and residential customers in both Bermuda and Cayman.

        The operating subsidiaries of One Communications Ltd. are Logic Communications Ltd. (trading as One Communications), Bermuda Digital Communications Ltd. (trading as One Communications), Cable Co. Ltd., and WestTel Limited in the Cayman Islands (trading as Logic)."

        https://onecomm.bm/investors/

        Why not discuss the contents of the draft and why it's awful. The fact that the author works for a telecom provider in a small country does not by itself mean much. Perhaps the proposal has been trialled there

        Need more facts (cf. speculation)

      • sleepychu2 days ago
        I must be missing something, why aren't their legitimate institutes based in Bermuda?
        • kennywinker2 days ago
          I believe Bermuda is a tax shelter country, which means people and companies register there to hide identity and income from the nations they live and do business in. Because of that, the vast majority of businesses registered in bermuda are not legitimate institutions - they are shell companies defrauding their home nations.
          • OutOfHere2 days ago
            And the home nation's governments defraud their people with unnecessary wars, wasteful spending, unpayable debt, and excessive inflation. There comes a time when paying less tax is the right thing to do.
            • kennywinker2 days ago
              I can think of few groups as likely to support wars than the ultra rich, but if you are very wealthy and don’t like your tax dollars going to military spending just invest in lockheed or raytheon and get it all back as dividends. War spending doesn’t justify tax fraud, unless you’re also out on the protest line when a new war breaks out.

              As the top tax rates fell, from 90% in 1950 to under 40% now - the use of tax shelters increased. So unless your “comes a time” is referencing pre 1915 USA, this isn’t a valid justification.

              If inflation is the issue, keep your money in a different currency.

              I just don’t see actions from the very rich (the ones using tax shelters) that back up your justifications.

              I think it’s simply the collapse of any kind of cohesion between the wealthy and the nation in which they live. Or put another way: I’m rich, i shouldn’t have to pay for stuff i don’t use!

            • ASalazarMX2 days ago
              Why are you even defending this practice? It's something very wealthy people do, they're not your everyday citizens conscious about how their taxes go.

              They evade taxes for financial reasons, not moral reasons.

        • 2 days ago
          undefined
    • 1vuio0pswjnm72 days ago
      "All RFCs are first published as Internet-Drafts (I-Ds). All RFCs have been I-Ds, but not all I-Ds become RFCs."

      "A well-formed RFC starts with a well-formed Internet-Draft."

      https://www.rfc-editor.org/pubprocess/

      For example, here is the Internet Draft for IPv6 which eventually became RFC 2460

      https://www.ietf.org/archive/id/draft-ietf-ipngwg-ipv6-spec-...

      Why not discuss the I-D itself. Many drafts are garbage but simply being a draft does not by itself tell us about its likelihood of becoming an RFC or standard

  • usui2 days ago
    > Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache. Every service a device requires is delivered in a single DHCP8 lease response.

    Isn't it 2 weeks late for April Fools'?

    • zythyx2 days ago
      I'm not going to pretend I know all about IP routing and networking. I understand enough of it to have a home server all appropriately set up with IPv4.

      But what makes this quote a problem? I mean, it seems a bit excessive, but I don't understand why...

      • vasachi2 days ago
        IP is what, four layers of protocols lower than OAUTH?
        • a day ago
          undefined
        • conorcleary2 days ago
          and they might as well earmark oauth3
          • anilakar2 days ago
            OAuth8, you surely meant.
      • bnjms2 days ago
        Just a gut check but it feels ugly to put auth in an L3 proposal.
      • justsomehnguy2 days ago
        Even skipping the hard parts:

        to make a request you need to receive a token

        to receive a token you need to make a request

        This is pure Catch-22.

        • red-iron-pine2 days ago
          hell, before we get and send the token how do we get a list of authorized users and systems over?

          and if we're going to use IPv4 / 6 to get set up, why switch to IPv8? we're already talking, and it's working so use certs and tokens over those protocols

      • dns_snek2 days ago
        It's a collection of words that don't actually say anything. What's being protected by these tokens and how? How is trust established? How do you bootstrap L3 authentication when you first need to reach a remote server over the internet?

        Like most AI slop it might sound reasonable at first glance but there's no substance behind it. Usually there's some (deeply flawed) substance but here it's just completely absent.

      • Alifatisk2 days ago
        I feel the same, I guess using JWT is the joke here?
      • 2 days ago
        undefined
    • smitty1e2 days ago
      It's never too late for a savory blend of tomato, carrot, celery, beet, parsley, lettuce, watercress, and spinach.
    • 2 days ago
      undefined
  • speedping2 days ago
    I'm working on my IPv9 proposal as we speak. It has an LLM validating the contents of every packet. Gotta stay ahead of the curve.
    • EmuAGRa day ago
      Is it backwards compatible with Windows 95/98? Maybe change the name to IPv10 just in case.
    • QuercusMax2 days ago
      I've got a spec for ipv11. Why? Because it's one more than 10.
      • fredoralive2 days ago
        I've got a spec for IPv2. Because of advances in carrier grade NAT, we can reduce the address field from 32 bits to 16, making amazing savings somehow.
      • lamasery2 days ago
        Can’t you just make ten… one larger?
        • aragilar2 days ago
          They're referencing https://en.wikipedia.org/wiki/Up_to_eleven (and you're one of today's lucky 10000: https://xkcd.com/1053/).
          • MattPalmer10862 days ago
            I think they are also riffing off the spinal tap scene, where he says "can't you just make 10 louder?".
            • lamasery2 days ago
              I was mainly doing that, and more-obliquely making use of math/CS dork jokes like "1 + 1 = 3, for large values of 1".
            • cassianoleal2 days ago
              I think that's what your comment parent is referencing as well
              • MattPalmer10862 days ago
                Looked like they missed that their parent post was already doing that. As another poster points out: wooosh!
                • iainmerrick2 days ago
                  Can’t you just make the first post say “whoosh”, and have that be the post?
              • 2 days ago
                undefined
          • rikkert2 days ago
            whoosh
  • magicalhippo2 days ago
    IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately.

    How is this different from IPv6? We've had 6to4 for ages, the problem is the other direction: how does a IPv4 host initiate a connection to a IPv8 host?

    Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The IPv8 compatibility layer intercepts socket calls transparently -- the application has zero IPv8 awareness.

    Except many IPv4 applications use the addresses of the source or that they bind to in some form. If it's secretly an IPv8 behind their back that'll break.

    • wmf2 days ago
      how does a IPv4 host initiate a connection to a IPv8 host?

      If you give up on P2P it just doesn't. All servers have IPv4 and NAT64 (or whatever they call it) handles v6-only clients.

      • magicalhippo2 days ago
        > If you give up on P2P it just doesn't.

        Sure, but then it's not as "plug and play" as they make it out to be. Many multiplayer games rely on P2P these days for example.

    • criticalfault2 days ago
      does ipv6 require Dual Stack Operation?
      • kalleboo2 days ago
        No, it doesn't. For example, many mobile networks are IPv6-only.
    • Hikikomori2 days ago
      Your local router sees the dns request, does some lookup, sees that its in a different ipv8 network, creates some tunnel to it. Seems like only the end client isn't aware of ipv8.
  • _ache_2 days ago
    > IPv8 does not require dual-stack operation.

    The whole thing isn't a joke because of this. Technically, it's IPv4++ and that about it.

    > Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens

    What ?!

    I'm not sure it's the path I want to follow.

    • linohh2 days ago
      Probably someone had an adderal fueled night with an LLM, that's just completely mad.
    • jojobas2 days ago
      Double checked the publication date, it's not April 1st.
    • Induane2 days ago
      I thought it was a joke but someone is serious.

      This is one of the worst things I have ever heard of proposal wise.

      The worst. I can't even. Literally.

  • RobotToaster2 days ago
    There's already an ipv8 https://www.rfc-editor.org/rfc/rfc1621

    There's also at least three ipv9s, only one of which was a joke https://en.wikipedia.org/wiki/List_of_IP_version_numbers

  • LeoPanthera2 days ago
    This is not a serious proposal and we should not treat it as such. And I apologise in advance for the length of this comment.

    "IPv4 is a proper subset of IPv8. No existing device, application, or network requires modification. 100% backward compatible."

    This cannot be true. Section 5.1 states that IPv8 uses version number 8 in the IP header Version field and the header is 8 octets longer than IPv4's. Any existing IPv4 router, switch ASIC, NIC, host stack, or firewall that sees a Version=8 packet will fail to parse it (most will drop it). Backward compatibility is logically impossible when the wire format is different.

    The spec simultaneously demands sweeping new machinery everywhere: new socket API (AF_INET8), new DNS record type (A8), new ARP (ARP8), new ICMP (ICMPv8), new BGP/OSPF/IS-IS, mandatory certified NIC firmware with hardware rate limits, mandatory Zone Servers, mandatory OAuth2 on switch ports, mandatory persistent TCP/443 to the Zone Server from every end device, and a new IANA version-number assignment. "No modification required" is contradicted on nearly every page.

    IP version 8 is already historically assigned (it was PIP, later folded into the IPv6 effort). The draft's IANA request ignores this.

    The ASN model conflates identity with location. ASNs are organizational identifiers assigned by RIRs, turning them into the 32-bit routing prefix means an organization cannot change providers, multihome with provider-assigned space, or use PI space the way networks do today. Every organization that wants public IPv8 connectivity must now hold an ASN - roughly a 1000x increase in ASN allocation.

    The /16 minimum injectable prefix rule eliminates essentially all of today's BGP traffic engineering and most multihoming patterns.

    Cross-AS Cost Factor (CF) requires every AS on Earth to trust the metrics injected by every other AS, including a "economic policy" component. BGP is policy-based precisely because ASes do not trust each other's metrics, this has been understood since the 1990s.

    The Zone Server kitchen sink (DNS + DHCP + NTP + OAuth + telemetry + ACL + NAT + WHOIS validation + PVRST root) concentrates a dozen unrelated functions into one box on one hardcoded address (.253/.254). This is an operational and security anti-pattern.

    PVRST is mandated. PVRST is a Cisco-proprietary spanning tree variant, mandating a vendor-specific protocol in a Standards-Track draft is a non-starter for IETF.

    The companion drafts (WHOIS8, NetLog8, Update8, WiFi8, Zone Server, RINE, routing protocols) are all by the same author, none have working-group review, and the core draft depends on all of them to function.

    • jubilanti2 days ago
      This has to have been at least researched via an LLM if not written by it. The form looks right but it is absurd. It angers me to think about how many people wasted their time and brainpower trying to understand this in the spirit of RFC good faith.
    • quotemstr2 days ago
      I was waiting for the proposal to describe the header field where the sender would indicate which of the four simultaneous days in one 24-hour rotation of the earth he inhabited.
    • jiggawatts2 days ago
      I hope your wrote that critique with an LLM[1], because the proposal is clearly not worth reading.

      Having said that... China once proposed their IP version to create a locked-down domestic Internet. You have to wonder about the OAuth requirement in this IPv8 proposal. Maybe someone fleeced a dictator somewhere out of their money by promising to get a new secure Internet protocol standardised for them!

      [1] With what prompt!? I like the terse output! Do share...

      • LeoPanthera2 days ago
        I wrote it with my brain. :(
        • jiggawatts2 days ago
          Liberally douse it with cleansing alcohol.
          • anilakar2 days ago
            Preferably with even-numbered ones.
    • Hikikomori2 days ago
      Reading parts of it seems only the end client would be unaware of ipv8, everything else is, and your local router uses a tunnel to the correct target by snooping on dns and using some new lookup. End clients are hardly the issue with ipv6.
    • jamieone5 hours ago
      [dead]
  • pmontra2 days ago
    > East-west security -- traffic between devices within a network -- is enforced by ACL8 zone isolation. Devices communicate only with their designated service gateway. The service gateway communicates only with the designated cloud service. Lateral movement between devices or zones is architecturally prevented by the absence of any permitted route to any other destination.

    I must be missing something or misinterpreting that section because if there is no "lateral movement" how do people in an office print a file, access a network drive, connect to the Exchange server? And those are only the most naive scenarios.

    • dijit2 days ago
      By using a cloud provider, obviously.

      Local networks are too dangerous to be trusted.

      If its not going through Azure you shouldn’t be allowed to connect to your peer devices.

      (/s. if that is needed).

    • ptx2 days ago
      Presumably they pay cloud vendors for cloud printing, cloud storage and cloud groupware, so to send something on the local network they simply send it to the cloud vendor and then download it again. That's what people in our office do. Very helpful for the cloud vendor's profitability.
    • jamieone5 hours ago
      [dead]
  • Retr0id2 days ago
    Don't forget the equally serious IPv7 https://www.ietf.org/archive/id/draft-ipv7-2025-00.html
  • imoverclocked2 days ago
    > IPv8 also resolves IPv4 address exhaustion. Each Autonomous System Number (ASN) holder receives 4,294,967,296 host addresses. The global routing table is structurally bounded at one entry per ASN

    Yes, let's conflate routing and addressing while throwing out decades of IPv6 implementation and design. (/sarcasm)

  • absynth2 days ago
    It probably has age verification on every packet.
    • ButlerianJihad2 days ago
      If your packet fails age verification at the router level, it will light up the EVIL bit, and then you're in a world of hurt, man!
    • kube-system2 days ago
      Yeah but they failed to adjust for age drift that may occur during the round trip latency of the packet. Unfortunately at intergalactic scale this error can be significant
    • 2 days ago
      undefined
    • Hamuko2 days ago
      Can I skip age verification by using UDP?
  • wg02 days ago
    Seems to be very censorship friendly protocol from grounds up.
    • repelsteeltje2 days ago
      * Censorship friendly, and

      * Surveillance friendly.

      What more do you want?!

    • sourcegrift2 days ago
      why cant they do an ipv5 with 64 bits of address soace for us humans?
      • SwellJoe2 days ago
        Sounds like this is exactly that. Too bad they didn't do that first, and we've had a couple decades of failing to widely adopt IPv6 because it's too complicated and confusing.

        "1.7. Backward Compatibility and Transition

        IPv4 is a proper subset of IPv8:

        IPv8 address with r.r.r.r = 0.0.0.0 = IPv4 address Processed by standard IPv4 rules No modification to IPv4 device required No modification to IPv4 application required No modification to IPv4 internal network required

        IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately. CF naturally incentivises IPv4 transit ASNs to upgrade by measuring higher latency on 8to4 paths -- an automatic economic signal without any mandate."

        • SkiFire132 days ago
          IPv6 doesn't require modifications to IPv4 devices, applications, networks etc etc either. You just cannot reach IPv6 networks and devices from them, and the same applies to IPv8. 8to4 is nothing innovative because 6to4 already exists. In the end this proposal has all the disadvantages of IPv6 with less advantages.
        • Hikikomori2 days ago
          Because extending ipv4 has all the same problems as ipv6.
        • sourcegrift2 days ago
          How can we adopt this 30 years back!?
      • stingraycharles2 days ago
        Did you read the proposal? It proposes 64 bit address space.
  • allixsenos2 days ago
    This is the best piece of speculative fiction I've read in the last year :D :D :D :D

    I didn't make it past page three. Enjoy responsibly.

  • zadikian2 days ago
    I get making it a superset of v4, but what's up with the oauth stuff?
    • red-iron-pine2 days ago
      authenticate every packet to a user. track every single ping, site visit, chat, etc.
  • chromacity2 days ago
    I guess I was right to wait out IPv6...

    But more seriously, it gives me a pause when we try to bake more complex, application-centric logic into foundational protocols. The list of assigned IPv4 and TCP option numbers is a graveyard of tech experiments, but at least we had the sense to separate them from the main protocol. Baking JSON web tokens and OAuth into IP seems kinda crazy from that point of view. Is this what we want to commit to for the next 40 years?

    I kinda wish that IPv6 just used this ("IPv8") addressing scheme and left everything else the same, though. I think the expectation that IPv6 should entail an architectural rethink for existing networks really slowed us down. Fun fact: at this point, IPv6 is 30 years old, we're still under 50%, and growth is visibly tapering off.

  • EvanZhouDeva day ago
    To be clear, when I posted this, the title of the post was "IPv8 Proposal". However, it seems to have been edited at some point to be "Internet Protocol Version 8 (IPv8)" thus becoming a misleading title and seems to have gotten his post flagged. Not sure how that happened, or why.
  • PaulKeeble2 days ago
    In many regards IPv6 was a change that went too far and didn't go far enough all at the same time, although slowly but surely it is being adopted. Something like this had a better chance at adoption precisely for how little it changed things. The most radical part is the merging of all services into one central blob and I think that is going to be the part most people take exception too especially oauth. It doesn't solve fundamental issues like roaming with mobile devices, something that now is really important to get rid of a lot of complexity that has built up.
  • albinn2 days ago
    One of the main (vocal) issues people seem to have with IPv6 is that the addresses are hard to remember. But having eight different three digit numbers (r.r.r.r.n.n.n.n) does not seem any easier unfortunately.
    • transcriptase2 days ago
      I’ll take 1.1.1.1.1.1.1.1 over the bastard child of a mac address and bitlocker recovery key any day of the week.
      • albinn2 days ago
        Sure, but remember your prefix 187.231.91.67.135.47.0.0/16
        • isatty2 days ago
          Not sure about what point you are making but that legit more readable than ipv6
          • fredoralive2 days ago
            I hearby propose an IPv6.1. The only change is the written form goes from:

            2001:db8::ff00:42:8329

            to

            128.1.13.184..255.0.0.66.131.41

            By doing this, I have changed IPv6 from the strange unwanted alien thing everyone hates, to the new wonder protocol that "just adds more dots" that everyone wants.

            I await my FIFA Peace Prize.

    • sschueller2 days ago
      I though the whole concept in IPv6 of remembering addresses is that you don't. That is IPv4 thinking...
      • PhilipRoman2 days ago
        I see this point a lot but it never really made sense to me. What exactly does IPv6 bring to the table that makes it unnecessary to remember IP addresses? Especially for anything more advanced than just looking up a hostname.
        • jeroenhd2 days ago
          IPv6 addresses can be plenty memorable. Mine starts with 2a10:3781:xxxx, and the rest of the address is whatever I want it to be. About as recognizable as my IPv4 address.

          If I wanted to memorize the addresses for some reason (maybe I broke DNS or something?), I'd just start numbering devices at 1 and keep going up.

          • gck1a day ago
            > maybe I broke DNS or something

            I break my DNS very often, or at least, often enough that it'd become nuisance that I can't instantly recall IP address of every machine in any of my 5 VLANs, AND type it in manually within 3 seconds.

            With IPv6, I'd have to drop whatever I'm doing and fix my DNS first.

            • jeroenhda day ago
              If you use SLAAC and don't use mDNS, I suppose, maybe? But if you break DNS often enough that you need to remember IP addresses, you can just do DHCPv6 if you want IPv4-like address allocation.

              It'll be even easier because you can use numbers greater than 254 for your local devices, or l33t-style hex addresses, without setting up routed subnets when you exceed your /24 like on IPv4.

    • SkiFire132 days ago
      And if you want the same address space as IPv6 you need to remember 16 digits. Having them written in decimal won't help you with that anyway.
  • rocqua2 days ago
    I hate to be this dismissive, but it feels like an academic with a paternalistic streak looked deeply at how the Internet works, saw lots of different protocols and weird design decisions, and decided: this is not coherent enough. Then he figured, I'll make all the decisions now, that way it'll be coherent. And let's give every subnet a centralised source of trust and management. That'll make the design so much cleaner!

    By which I mean to insinuate there's a lot of nuance and learned lessons in the current situation that this design seems not to learn from. Even though it did learn some lessons, I don't think this passes 'Chestertons fence'

    • red-iron-pine2 days ago
      nah. this is palantir operating through a bermuda holding company trying to shoe-horn oauth into every single packet to force every single click ever to be authenticated against a persona. the goal is 1984.
  • flomo2 days ago
    Lots of fishhooks in there, so lets see how this goes. (some are pretty obscure)
  • zerof1l2 days ago
    Either a joke or vibe-coded. Whole thing is nonsense.
  • 19skitsch2 days ago
    Interesting… Feels like a beautifully designed network for a world where operators trust each other more than they actually do
  • compounding_it2 days ago
    The solution to the solution to solve a problem is to create a new problem.
  • dark-star16 hours ago
    At first glance this looks like a joke. But if you look closer, it looks really workable (well, maybe except those "mandatory NIC-enforced security" bits)

    I'm hoping someone will be brave (or stupid) enough to actually implement this. I have a personal ASN number that I'm willing to participate with :)

  • tptacek2 days ago
    Obvious reminder that anybody can publish an Internet-Draft.
    • otterley2 days ago
      Also, who is the author? He seems to have appeared from nowhere, like Satoshi Nakamoto. Maybe it’s just Claude posing as a network engineer.
      • wmf2 days ago
        I think you would have to be an outsider to come up with this proposal because it challenges many sacred cows of the IETF establishment. It has no chance of being taken seriously and I personally disagree with a bunch of the decisions but it's entertaining to ponder what kind of mindset would produce this.
        • Ekaros2 days ago
          Insider would understand that there is non-existing chance of any new IP protocol being even considered or taking off. And thus any effort spend on it would be complete waste. Best you can do is work on some addition or backwards compatible new functionality.
  • 2 days ago
    undefined
  • johnea2 days ago
    I'd judge IPv8 based on what DJB has to say about it...
  • fivetimestwo2 days ago
    Is this AGI ?
  • chewbacha2 days ago
    My immediate first thought is if the XKCD standards comic

    https://xkcd.com/927/

  • m4r1k2 days ago
    dead on arrival.
  • hathym2 days ago
    [dead]
  • 2 days ago
    undefined
  • suriboy2 days ago
    [dead]
  • FpUser2 days ago
    How do we secure internet to the point it does not work anymore. Well except government and big corporate sites