> How about if I say "traffic amplification over a remote path" instead  
> of "packet amplification"?

wfm.

> > Seems like a sentence or two describing the exploitation itself would
> > be good. Not a lot of detail, but more than just "it can be
> > exploited". (Later, I see that you include such text in the security
> > considerations section. I think it should be moved to (or included in)
> > the beginning of the document.

> Would a forward reference to the Security Considerations section be a  
> reasonable compromise?

IMO, no. The document should flow smoothly to the reader. This belongs
up front, not at the end. IMO.

> >> 8.1.  Normative References
> >
> >
> >>    [RFC4294]  Loughney, J., "IPv6 Node Requirements", RFC 4294,
> >>               April 2006.
> >
> > Shouldn't this  reference be informative?

> The document states that it update RFC4294 in section 1, so I  
> presumed that reference needed to be normative.

Ah, right. OK.

Thomas

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to