[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#864783: RM: aiccu/20070115-17



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: rm
Control: severity 863720 serious
Control: found 863720 20070115-14

Hi,

the sunset of SixXS has passed, see https://bugs.debian.org/863720 for
details and discussion.

And unfortunately, neither

* SixXS changed their mind, nor
* did SixXS open-source the server implementation, nor
* did someone else come up with an AYIYA(*) server implementation or a
  comparable service.

There though seems to be one ISP though which uses aiccu to setup
tunnels for his own customers, but also only for them as the
authentication seems to be based on the MAC address from where the
TIC(**) request comes from. See
https://en.wikipedia.org/wiki/AICCU#Usage and
http://n6.netbox.cz/mediawiki/index.php/AICCU (the latter is in Czech
language only.) I also doubt that they've implemented an AYIYA server
for the tunnel and suspect they use other tunnel types.

https://en.wikipedia.org/wiki/List_of_IPv6_tunnel_brokers also lists
AARNet as existing tunnel broker and at least in the past this broker
was supported by aiccu officially. (See
https://web.archive.org/web/20061026034634/http://www.sixxs.net/tools/aiccu/brokers/.)
And http://broker.aarnet.net.au/ indeed still exists. But then again
they're listed as "broken" on Wikipedia.

And the TIC server implementation I found on CPAN
(https://metacpan.org/pod/Net::SixXS::TIC::Server) is rather esoteric
respectively academic. While it seems to be able to communicate with
aiccu, no according AYIYA server implementation showed up so you can
only use it with tunnel protocols where better clients exist anyways.

So the only production-mode way to still use aiccu is with Netbox.cz
while being one of their customers. But neither Mike (AFAIK) nor I are
customers of Netbox.cz.

Hence I must agree with a heavy heart that it indeed is better to
remove aiccu from Stretch as we can't really fully test it anymore for
e.g. stable security updates or so.

Other distributions have removed aiccu as well, e.g. OpenWRT at
https://github.com/openwrt/packages/commit/441f8a3e

So please remove aiccu from Stretch. There seem to be no reverse
dependencies and also no reverse build dependencies.

Mike and me agreed to keep it around in Debian Unstable for at least a
few more months in the hope that any of the above mentioned events
still happen. If neither of these events happen (within a year or so),
we'll likely let aiccu also be removed from Debian Unstable.

Accordingly I'm setting #863720 back to serious with this mail to keep
it out of testing for now.

I'll probably also open an RFA with the explicit mention that the only
known use case are customers of Netbox.cz.

*sigh*

(*)  AYIYA is aiccu's most used tunneling protocol and the only one
     suitable for NAT traversal and dynamic IPs. Unfortunately there's
     no publically available server implementation.

(**) TIC is the Tunnel Information and Control protocol, i.e. a
     protocol to gather the necessary information to setup tunnels.

		Regards, Axel
-- 
 ,''`.  |  Axel Beckert <abe@debian.org>, http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-    |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE

Attachment: signature.asc
Description: Digital signature


Reply to: