scott liebrand has already followed up on most of what i thought interesting
in brian dickson's latest post on this thread, so i'll limit myself to this:

> The thing we need to be concerned about is not only route leakage, but
> packet leakage, especially if it has the ability to affect the core
> infrastructure, e.g. DNS.

in RFC 1918 land, it's impossible for a root name server to know where the
junk-source queries are coming from, since 192.168.1.100 looks the same no
matter who leaks it.  in any ULA plan, "recourse" has to exist, such that
when someone sends you a DNS query you can't reply to because it's from a
ULA-verse that you're not part of, you can still look it up in WHOIS.  i've
got a metric buttload of leaked corporate identifiers on hand that i have
no way to embarrass anybody with because by definition i cannot know the
identity of the leaker.  let's ensure that ad-hoc networking doesn't mean
"recourse-free networking".  (therefore ULA-G's WHOIS requirements.)


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to