Tim's wording is better but still uses the word
"connections" which implies TCP to many readers, and hence
I prefer "communication".

> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of
> Tim Chown
> Sent: Wednesday, July 29, 2009 12:24 AM
> To: Thomas Narten
> Cc: john.lough...@nokia.com; ipv6@ietf.org; Brian E Carpenter
> Subject: Re: Node Requirements: Issue 14 - Privacy Extensions
>
> On Tue, Jul 28, 2009 at 02:06:45PM -0400, Thomas Narten wrote:
> >
> > That said, I generally like Brian's proposed text:
>
> I agree.
>
> > >    In such situations, RFC4941 SHOULD be implemented. In other
> cases,
> > >    RFC4941 provides limited or no benefit.
> >
> > One possible tweak on the last sentence, how about:
> >
> >      In such situations, RFC4941 SHOULD be implemented. In other
> >      cases, such as with standalone servers, RFC4941 provides limited
> >      or no benefit.
>
> How about - to avoid the 'server' terminology turning it around to say:
>
>       In such situations, RFC4941 SHOULD be implemented.  However, if
>       the node is not expected to initiate connections, or the
> potential
>       tracking or correlation over time of such connections is not a
>       concern, RFC4941 provides limited or no benefit.
>
> > > >    It is
> > > >    noted that a number of applications do not work with addresses
> > > >    generated with this method, while other applications work
> quite
> > > >    well with them.
> >
> > More to the point, there was (at the time) and (probably) still is
> > today some controversy as to whether the above statement is actually
> > correct. There have certainly been anectdotes to the effect that
> > privacy addresses don't work well in some cases (because they aren't
> > in the DNS properly), but I am also quite sure that the reverse DNS
> is
> > not well populated generally, so its unclear how real an issue that
> is
> > in practice. (For example, those of you that travel a lot will likely
> > find that often the "local" hotel address you are given is not in the
> > DNS.)
>
> It's not just reverse DNS issues.   For example I recall a
> videoconferencing
> app that used multiple connections initiated in different directions
> between
> two participating hosts.   Between v4 hosts the code assumed a single
> global
> address was used between peers, and that worked, but when ported to
> support
> v6 it failed due to attempts to connect back to the observed privacy
> address
> of the remote peer failing because a firewall hole only existed to talk
> to
> the peer's 'static' global v6 address.  I suspect similar 'referal'
> issues
> may happen in other cases.
>
> --
> Tim
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to