logoalt Hacker News

IPv8 Proposal

81 pointsby EvanZhouDevtoday at 5:07 AM55 commentsview on HN

Comments

timokoesterstoday at 5:32 AM

This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D is not endorsed by the IETF and has no formal standing in the IETF standards process.

https://datatracker.ietf.org/doc/draft-thain-ipv8/

show 1 reply
usuitoday at 5:52 AM

> Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache. Every service a device requires is delivered in a single DHCP8 lease response.

Isn't it 2 weeks late for April Fools'?

show 2 replies
RobotToastertoday at 6:01 AM

There's already an ipv8 https://www.rfc-editor.org/rfc/rfc1621

There's also at least three ipv9s, only one of which was a joke https://en.wikipedia.org/wiki/List_of_IP_version_numbers

_ache_today at 5:29 AM

> IPv8 does not require dual-stack operation.

The whole thing isn't a joke because of this. Technically, it's IPv4++ and that about it.

> Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens

What ?!

I'm not sure it's the path I want to follow.

show 3 replies
speedpingtoday at 5:34 AM

I'm working on my IPv9 proposal as we speak. It has an LLM validating the contents of every packet. Gotta stay ahead of the curve.

show 1 reply
magicalhippotoday at 5:36 AM

IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately.

How is this different from IPv6? We've had 6to4 for ages, the problem is the other direction: how does a IPv4 host initiate a connection to a IPv8 host?

Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The IPv8 compatibility layer intercepts socket calls transparently -- the application has zero IPv8 awareness.

Except many IPv4 applications use the addresses of the source or that they bind to in some form. If it's secretly an IPv8 behind their back that'll break.

show 2 replies
pmontratoday at 5:35 AM

> East-west security -- traffic between devices within a network -- is enforced by ACL8 zone isolation. Devices communicate only with their designated service gateway. The service gateway communicates only with the designated cloud service. Lateral movement between devices or zones is architecturally prevented by the absence of any permitted route to any other destination.

I must be missing something or misinterpreting that section because if there is no "lateral movement" how do people in an office print a file, access a network drive, connect to the Exchange server? And those are only the most naive scenarios.

show 2 replies
Retr0idtoday at 5:48 AM

Don't forget the equally serious IPv7 https://www.ietf.org/archive/id/draft-ipv7-2025-00.html

show 1 reply
LeoPantheratoday at 5:41 AM

This is not a serious proposal and we should not treat it as such. And I apologise in advance for the length of this comment.

"IPv4 is a proper subset of IPv8. No existing device, application, or network requires modification. 100% backward compatible."

This cannot be true. Section 5.1 states that IPv8 uses version number 8 in the IP header Version field and the header is 8 octets longer than IPv4's. Any existing IPv4 router, switch ASIC, NIC, host stack, or firewall that sees a Version=8 packet will fail to parse it (most will drop it). Backward compatibility is logically impossible when the wire format is different.

The spec simultaneously demands sweeping new machinery everywhere: new socket API (AF_INET8), new DNS record type (A8), new ARP (ARP8), new ICMP (ICMPv8), new BGP/OSPF/IS-IS, mandatory certified NIC firmware with hardware rate limits, mandatory Zone Servers, mandatory OAuth2 on switch ports, mandatory persistent TCP/443 to the Zone Server from every end device, and a new IANA version-number assignment. "No modification required" is contradicted on nearly every page.

IP version 8 is already historically assigned (it was PIP, later folded into the IPv6 effort). The draft's IANA request ignores this.

The ASN model conflates identity with location. ASNs are organizational identifiers assigned by RIRs, turning them into the 32-bit routing prefix means an organization cannot change providers, multihome with provider-assigned space, or use PI space the way networks do today. Every organization that wants public IPv8 connectivity must now hold an ASN - roughly a 1000x increase in ASN allocation.

The /16 minimum injectable prefix rule eliminates essentially all of today's BGP traffic engineering and most multihoming patterns.

Cross-AS Cost Factor (CF) requires every AS on Earth to trust the metrics injected by every other AS, including a "economic policy" component. BGP is policy-based precisely because ASes do not trust each other's metrics, this has been understood since the 1990s.

The Zone Server kitchen sink (DNS + DHCP + NTP + OAuth + telemetry + ACL + NAT + WHOIS validation + PVRST root) concentrates a dozen unrelated functions into one box on one hardcoded address (.253/.254). This is an operational and security anti-pattern.

PVRST is mandated. PVRST is a Cisco-proprietary spanning tree variant, mandating a vendor-specific protocol in a Standards-Track draft is a non-starter for IETF.

The companion drafts (WHOIS8, NetLog8, Update8, WiFi8, Zone Server, RINE, routing protocols) are all by the same author, none have working-group review, and the core draft depends on all of them to function.

show 3 replies
zadikiantoday at 5:50 AM

I get making it a superset of v4, but what's up with the oauth stuff?

imoverclockedtoday at 6:01 AM

> IPv8 also resolves IPv4 address exhaustion. Each Autonomous System Number (ASN) holder receives 4,294,967,296 host addresses. The global routing table is structurally bounded at one entry per ASN

Yes, let's conflate routing and addressing while throwing out decades of IPv6 implementation and design. (/sarcasm)

absynthtoday at 5:20 AM

It probably has age verification on every packet.

show 2 replies
PaulKeebletoday at 5:45 AM

In many regards IPv6 was a change that went too far and didn't go far enough all at the same time, although slowly but surely it is being adopted. Something like this had a better chance at adoption precisely for how little it changed things. The most radical part is the merging of all services into one central blob and I think that is going to be the part most people take exception too especially oauth. It doesn't solve fundamental issues like roaming with mobile devices, something that now is really important to get rid of a lot of complexity that has built up.

wg0today at 5:14 AM

Seems to be very censorship friendly protocol from grounds up.

show 2 replies
chromacitytoday at 5:27 AM

I guess I was right to wait out IPv6...

But more seriously, it gives me a pause when we try to bake more complex, application-centric logic into foundational protocols. The list of assigned IPv4 and TCP option numbers is a graveyard of tech experiments, but at least we had the sense to separate them from the main protocol. Baking JSON web tokens and OAuth into IP seems kinda crazy from that point of view. Is this what we want to commit to for the next 40 years?

I kinda wish that IPv6 just used this ("IPv8") addressing scheme and left everything else the same, though. I think the expectation that IPv6 should entail an architectural rethink for existing networks really slowed us down. Fun fact: at this point, IPv6 is 30 years old, we're still under 50%, and growth is visibly tapering off.

rocquatoday at 5:23 AM

I hate to be this dismissive, but it feels like an academic with a paternalistic streak looked deeply at how the Internet works, saw lots of different protocols and weird design decisions, and decided: this is not coherent enough. Then he figured, I'll make all the decisions now, that way it'll be coherent. And let's give every subnet a centralised source of trust and management. That'll make the design so much cleaner!

By which I mean to insinuate there's a lot of nuance and learned lessons in the current situation that this design seems not to learn from. Even though it did learn some lessons, I don't think this passes 'Chestertons fence'

compounding_ittoday at 5:51 AM

The solution to the solution to solve a problem is to create a new problem.

albinntoday at 5:27 AM

One of the main (vocal) issues people seem to have with IPv6 is that the addresses are hard to remember. But having eight different three digit numbers (r.r.r.r.n.n.n.n) does not seem any easier unfortunately.

show 3 replies
flomotoday at 5:49 AM

Lots of fishhooks in there, so lets see how this goes. (some are pretty obscure)

19skitschtoday at 5:18 AM

Interesting… Feels like a beautifully designed network for a world where operators trust each other more than they actually do

chewbachatoday at 5:46 AM

My immediate first thought is if the XKCD standards comic

https://xkcd.com/927/

fivetimestwotoday at 5:54 AM

Is this AGI ?

tptacektoday at 5:23 AM

Obvious reminder that anybody can publish an Internet-Draft.

show 1 reply
FpUsertoday at 5:29 AM

How do we secure internet to the point it does not work anymore. Well except government and big corporate sites

suriboytoday at 5:21 AM

[dead]