Brian,

On 03/30/2012 09:47 PM, Brian E Carpenter wrote:
> On 2012-03-31 02:04, Ray Hunter wrote:
> ...
>> The idea being that authorized persons e.g. law enforcement and network
>> managers SHOULD be able to correlate activity at a later date (for legal
>> compliance, logging, fault finding etc.) whilst an attacker or
>> unauthorized person SHOULD NOT.
> 
> If you were a blogger sitting in an Internet cafe in a country governed
> by a repressive regime, you would probably hold a different view.

If the regime controls the local-link, then as far as address-tracking
is concerned, you're toast. -- They could sniff the network and log the
address->MAC mappings, have RAs require you to do DHCPv6 and then have
DHCPv6 assign you a constant address, etc.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492



--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to