From owner-freebsd-ports@freebsd.org Wed Oct 9 10:05:52 2019 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A610A147596 for ; Wed, 9 Oct 2019 10:05:52 +0000 (UTC) (envelope-from jbeich@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46p8xD30S4z4Ckw; Wed, 9 Oct 2019 10:05:52 +0000 (UTC) (envelope-from jbeich@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1354) id 58F57FB2E; Wed, 9 Oct 2019 10:05:52 +0000 (UTC) From: Jan Beich To: Yasuhiro KIMURA Cc: freebsd-ports@freebsd.org Subject: Re: Is IPV6 option still necessary? References: <20191007.151841.1094708479149685365.yasu@utahime.org> Date: Wed, 09 Oct 2019 12:05:49 +0200 In-Reply-To: <20191007.151841.1094708479149685365.yasu@utahime.org> (Yasuhiro KIMURA's message of "Mon, 07 Oct 2019 15:18:41 +0900 (JST)") Message-ID: <8spu-p72a-wny@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Oct 2019 10:05:52 -0000 Yasuhiro KIMURA writes: > On October 10, 2012 IPV6 option of all ports was enabled by > default. Commit message said "We are in 2012, it is time to activate > IPV6 options by default everywhere". > > And now we are in 2019. IPv6 is more widely used than 2012. So I > wonder if IPV6 option is still necessary. ipv6 in CATEGORIES is also of dubious value nowadays. For one, www/firefox has "ipv6" while www/chromium does not.