The attitude you're expressing does not seem to be in the spirit of collaborative discussion, which I find somewhat unusual and disappointing coming from you. But, if that is your position you are certainly entitled to it and I have no problem with it.
Thanks - Fred [EMAIL PROTECTED]
Pekka Savola wrote:
>Hi, > >I just about used up all my aspirin and tranquilizers trying to read >this message constructively and trying to write a constructive reply >to this message but failed. > >I don't think this document is constructive as a requirements >document, and I'll strongly oppose it being adopted as WG document >at any point of time. > >On Mon, 17 Nov 2003, Fred Templin wrote: > > >>>well, the document seems like to completely concentrate on an >>>addressing-based solution model.. which it probably should not. Anyone >>>even glancing at the document can be 100% sure of this. >>> >>>Or was it only supposed to be agnostic of whether local-use addressing was >>>needed? There's a difference there.. >>> >>>So, I agree 100% with Erik's earlier comments on the "coloring" and the >>>"background" of the document.. >>> >>> >>> >>I'm still waiting to see the specific comments that will correct this >>often-expressed wrong impression. Maybe they will appear below; >>I'll respond as I go and see where we end up. >> >> >> >>>(I only read the beginning of the draft, got too big a headache..) >>> >>> >>> >>Take some aspirin, then. >> >> >> >>>substantial >>>----------- >>> >>>1) the whole section 3.2 Maintaining Confidentiality of the Address Space is >>>pretty much bogus. Remember, we're talking about using local communications >>>with *IPv6*. With IPv4, you would be required to record the address >>>prefixes in the RIR registries etc. -- but these are no longer relevant. >>>You get one /48, put it in the registry, that's it. No exposing needed. >>> >>>Beyond that, all the exposing you'd do is what you choose to do yourself. >>>If you don't want to give e.g. people the ability to traceroute through the >>>network to learn the network properties, you can prevent that. >>> >>>In summary, this whole section should be removed or seriously reworded. >>> >>> >>> >>I disagree. Network managers should be empowered to self-select >>addresses to be used for internal-only communications and with >>no pre-arrangement with a RIR. For example, in IPv4 I know that >>network 15/8 is owned by HP, network 16/8 is (was?) owned by >>Digital Equipment Corporation, etc. But, general knowledge of >>this is nothing more than a burden on the party holding the >>registration, since they now need to concern themselves with >>liabilities for misuse of the RIR prefixes. >> >>In IPv6, there should be no reason for even this level of >>exposure if the addresses are indeed to be used only for local >>communications. Thus, the ability for network managers to >>self-select addresses would be an improvement over the existing >>condition for IPv4. >> >> >> >>>2) I don't see the point of section 3.3 myself: >>> >>> Test networks are frequently large, elaborate networks with a mix of >>> public and private address space. Use of random unallocated space >>> runs the risk of collision with legitimate addresses on remote >>> networks if the test network is ever connected to the Internet. >>> >>>==> what kind of test network are you talking about? >>>why would you ever connect a test to the Internet, except through some DMZ >>>hosts/routers etc? >>> >>>With IPv6, you have enough addresses to play around if you want to connect >>>something to the net. If you don't, you can just invent something (most TAC >>>etc. labs probably certaintly do). No magic there... >>> >>>Needs rewording to bring up the point better or remove.. >>> >>> >>> >>OK, how about this: >> >> "Test networks often provide a vehicle for limited experimentation >> with new Internetworking technologies prior to widescale deployment, >> but they may need to connect to the Internet to facilitate the >>experiment. >> Such experiments may entail large, elaborate networks with a mix of >> public and private address space, but the use of random unallocated >> space runs the risk of collision with legitimate addresses on remote >> networks." >> >>But, is this enough to warrant a new document revision? I >>don't think so. >> >> >> >>>3) there is solutionism/assuming the addressing is the answer in many of the >>>goal sections, like 3.4, 3.6, 3.6.2, 3.6.3, 3.7, 3.8. Intentional? >>> >>> >>> >>Please provide specific examples of text that you believe assumes >>a particular solution alternative, since there was no intention to >>dictate a particular alternative. >> >>If certain solution alternatives seem to suggest themselves based on >>the scenarios, then the document is doing its work - but this is NOT >>due to the intentional manipulation of the authors (see changelogs >>and acknolwedgements for the substantial community input already >>taken). >> >> >> >>>4) section 3.6.2 is just section 3.5 again (note it says Section 3.2 in the >>>text), could be removed ? >>> >>> >>> >>This is a valid point, but I prefer to say that sections 3.6.2 and 3.5 >>could be consolidated rather than removing one or the other. Does >>this warrant another revision, though? My take is no. >> >> >> >>>5) section 3.7 is a bit incomprehensible: >>> >>>3.7 Asset Protection in Enterprise Networks >>> >>> Enterprise networks that protect private corporate assets (e.g., >>> printers, faxes, robotics, sensors, etc.) require an addressing >>> scheme that remains stable even when VPN connections from outside >>> sites occur. >>> >>>==> how on earth would VPN connections from outside disturb a stable >>>addressing scheme?!? >>> >>> >>> >>We are talking here about site mergers, which becomes apparent >>in the subsequent sentences of that paragraph. When two sites >>merge, ongoing local communications which were in-progress >>within the two seperate sites should continue without breaking >>when the two sites become one. >> >>The sentences you cite above are taken out of context, and the >>meaning seems clear enough when they are considered within >>the context of the entire section. >> >> >> >>>6) it's no surprise that section 4 on goals presupposes an addressing-based >>>solution. Is this intentional? In any case, the titles are: >>> >>>4.1 Easy to Acquire >>>4.2 Stable >>>4.3 Multiple Link Support >>>4.4 Prefix Filtering and Hints to Applications >>>4.5 Globally Unique >>>4.6 Usable in the Absence of a Provider >>>4.7 Applicable in Managed/Unmanaged Environments >>>4.8 Compatible with Site Naming System >>>4.9 Compatible with VPN >>>4.10 Multiple Addressing >>> >>>one could generalize and reword these to: >>> >>>4.1 Easy to Take to Use >>>4.2 Session Stability >>>4.3 Multiple Link Support >>>4.4 Application Awareness of Policy >>>4.5 Locality Between Multiple Sites >>>4.6 Usable in the Absence of a Provider >>>4.7 Applicable in Managed/Unmanaged Environments >>>4.8 Compatible with Site Naming System >>>4.9 Compatible with VPN (XXX: ?) >>>4.10 Provision for Both Local and Global Communications >>> >>> >>> >>One could always re-word, yes, but re-wording can always >>be done ad-inifinitum. I don't see anything in any of these >>suggestions that provides any beneficial clarification. >> >> >> >>>semi-editorial >>>-------------- >>> >>>Abstract >>> >>> The IPv6 addressing architecture specifies global and local-use >>> unicast addressing schemes, but provides no operational guidelines >>> for their use. >>> >>>and: >>> >>>1. Introduction >>> >>> The IPv6 addressing architecture [RFC3513] specifies global and >>> local-use unicast addresses. Global addresses are understood to have >>> unlimited range and may be used as the source and destination >>> addresses in packets that originate from any point on the connected >>> global IPv6 Internet. Local-use addresses are intended for use only >>> within the range of a single link/site, but their specification does >>> not address operational considerations for real-world deployment >>> scenarios. >>> >>>==> the critical local-use addressing part is to be removed before this >>>becomes relevant, so I don't think it's appropriate to refer to these >>>documents here. Suggest removing or serious rewording. >>> >>> >>> >>Update from [RFC3513] to [RFC3513(bis)] you mean? >>I don't see this in and of itself necessitating a document >>update; in fact, the role of the hain-templin document is >>to set the target in motion - not to track the target as it >>moves. >> >> >> >>>.... >>> >>>. As such, >>> the address prefixes used in each PAN should be globally unique to >>> avoid collisions and provide a means for verifying ownership to >>> resolve conflicts. >>> >>>==> this (in 3.5) doesn't seem to be relevant to the local communications, >>>remove? >>> >>> >>> >>This goes with the above comment on consolidating sections 3.5 >>and 3.6.2, but do these alone warrant a new document revision? >>My take is that they don't. >> >> >> >> >>>editorial >>>--------- >>> >>>. Of >>> utmost importance is that the systems on board the ship all function, >>> >>>==> s/Of utmost importance is/It's of utmost importance/ >>> >>> >>> >>Noted. >> >>Fred >>[EMAIL PROTECTED] >> >> >>-------------------------------------------------------------------- >>IETF IPv6 working group mailing list >>[EMAIL PROTECTED] >>Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 >>-------------------------------------------------------------------- >> >> >> > > >
-------------------------------------------------------------------- IETF IPv6 working group mailing list [EMAIL PROTECTED] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------