IPv8 Proposal
EvanZhouDev
72 points
44 comments
April 16, 2026
Related Discussions
Found 5 related stories in 64.5ms across 4,686 title embeddings via pgvector HNSW
- Internet Protocol Version 8 (IPv8) bpierre · 12 pts · April 15, 2026 · 85% similar
- IPv6 is the only way forward quaintdev · 48 pts · April 07, 2026 · 49% similar
- The Road Not Taken: A World Where IPv4 Evolved billpg · 71 pts · March 12, 2026 · 49% similar
- IPv6 address, as a sentence you can remember LorenDB · 55 pts · April 01, 2026 · 46% similar
- New patches allow building Linux IPv6-only Bender · 115 pts · April 01, 2026 · 38% similar
Discussion Highlights (20 comments)
wg0
Seems to be very censorship friendly protocol from grounds up.
19skitsch
Interesting… Feels like a beautifully designed network for a world where operators trust each other more than they actually do
absynth
It probably has age verification on every packet.
rocqua
I hate to be this dismissive, but it feels like an academic with a paternalistic streak looked deeply at how the Internet works, saw lots of different protocols and weird design decisions, and decided: this is not coherent enough. Then he figured, I'll make all the decisions now, that way it'll be coherent. And let's give every subnet a centralised source of trust and management. That'll make the design so much cleaner! By which I mean to insinuate there's a lot of nuance and learned lessons in the current situation that this design seems not to learn from. Even though it did learn some lessons, I don't think this passes 'Chestertons fence'
tptacek
Obvious reminder that anybody can publish an Internet-Draft.
albinn
One of the main (vocal) issues people seem to have with IPv6 is that the addresses are hard to remember. But having eight different three digit numbers (r.r.r.r.n.n.n.n) does not seem any easier unfortunately.
chromacity
I guess I was right to wait out IPv6... But more seriously, it gives me a pause when we try to bake more complex, application-centric logic into foundational protocols. The list of assigned IPv4 and TCP option numbers is a graveyard of tech experiments, but at least we had the sense to separate them from the main protocol. Baking JSON web tokens and OAuth into IP seems kinda crazy from that point of view. Is this what we want to commit to for the next 40 years? I kinda wish that IPv6 just used this ("IPv8") addressing scheme and left everything else the same, though. I think the expectation that IPv6 should entail an architectural rethink for existing networks really slowed us down. Fun fact: at this point, IPv6 is 30 years old, we're still under 50%, and growth is visibly tapering off.
FpUser
How do we secure internet to the point it does not work anymore. Well except government and big corporate sites
_ache_
> IPv8 does not require dual-stack operation. The whole thing isn't a joke because of this. Technically, it's IPv4++ and that about it. > Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens What ?! I'm not sure it's the path I want to follow.
timokoesters
This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D is not endorsed by the IETF and has no formal standing in the IETF standards process. https://datatracker.ietf.org/doc/draft-thain-ipv8/
speedping
I'm working on my IPv9 proposal as we speak. It has an LLM validating the contents of every packet. Gotta stay ahead of the curve.
pmontra
> East-west security -- traffic between devices within a network -- is enforced by ACL8 zone isolation. Devices communicate only with their designated service gateway. The service gateway communicates only with the designated cloud service. Lateral movement between devices or zones is architecturally prevented by the absence of any permitted route to any other destination. I must be missing something or misinterpreting that section because if there is no "lateral movement" how do people in an office print a file, access a network drive, connect to the Exchange server? And those are only the most naive scenarios.
magicalhippo
IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately. How is this different from IPv6? We've had 6to4 for ages, the problem is the other direction: how does a IPv4 host initiate a connection to a IPv8 host? Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The IPv8 compatibility layer intercepts socket calls transparently -- the application has zero IPv8 awareness. Except many IPv4 applications use the addresses of the source or that they bind to in some form. If it's secretly an IPv8 behind their back that'll break.
LeoPanthera
This is not a serious proposal and we should not treat it as such. And I apologise in advance for the length of this comment. "IPv4 is a proper subset of IPv8. No existing device, application, or network requires modification. 100% backward compatible." This cannot be true. Section 5.1 states that IPv8 uses version number 8 in the IP header Version field and the header is 8 octets longer than IPv4's. Any existing IPv4 router, switch ASIC, NIC, host stack, or firewall that sees a Version=8 packet will fail to parse it (most will drop it). Backward compatibility is logically impossible when the wire format is different. The spec simultaneously demands sweeping new machinery everywhere: new socket API (AF_INET8), new DNS record type (A8), new ARP (ARP8), new ICMP (ICMPv8), new BGP/OSPF/IS-IS, mandatory certified NIC firmware with hardware rate limits, mandatory Zone Servers, mandatory OAuth2 on switch ports, mandatory persistent TCP/443 to the Zone Server from every end device, and a new IANA version-number assignment. "No modification required" is contradicted on nearly every page. IP version 8 is already historically assigned (it was PIP, later folded into the IPv6 effort). The draft's IANA request ignores this. The ASN model conflates identity with location. ASNs are organizational identifiers assigned by RIRs, turning them into the 32-bit routing prefix means an organization cannot change providers, multihome with provider-assigned space, or use PI space the way networks do today. Every organization that wants public IPv8 connectivity must now hold an ASN - roughly a 1000x increase in ASN allocation. The /16 minimum injectable prefix rule eliminates essentially all of today's BGP traffic engineering and most multihoming patterns. Cross-AS Cost Factor (CF) requires every AS on Earth to trust the metrics injected by every other AS, including a "economic policy" component. BGP is policy-based precisely because ASes do not trust each other's metrics, this has been understood since the 1990s. The Zone Server kitchen sink (DNS + DHCP + NTP + OAuth + telemetry + ACL + NAT + WHOIS validation + PVRST root) concentrates a dozen unrelated functions into one box on one hardcoded address (.253/.254). This is an operational and security anti-pattern. PVRST is mandated. PVRST is a Cisco-proprietary spanning tree variant, mandating a vendor-specific protocol in a Standards-Track draft is a non-starter for IETF. The companion drafts (WHOIS8, NetLog8, Update8, WiFi8, Zone Server, RINE, routing protocols) are all by the same author, none have working-group review, and the core draft depends on all of them to function.
PaulKeeble
In many regards IPv6 was a change that went too far and didn't go far enough all at the same time, although slowly but surely it is being adopted. Something like this had a better chance at adoption precisely for how little it changed things. The most radical part is the merging of all services into one central blob and I think that is going to be the part most people take exception too especially oauth. It doesn't solve fundamental issues like roaming with mobile devices, something that now is really important to get rid of a lot of complexity that has built up.
chewbacha
My immediate first thought is if the XKCD standards comic https://xkcd.com/927/
Retr0id
Don't forget the equally serious IPv7 https://www.ietf.org/archive/id/draft-ipv7-2025-00.html
flomo
Lots of fishhooks in there, so lets see how this goes. (some are pretty obscure)
zadikian
I get making it a superset of v4, but what's up with the oauth stuff?
compounding_it
The solution to the solution to solve a problem is to create a new problem.