Brian, On 03/30/2012 09:47 PM, Brian E Carpenter wrote: > On 2012-03-31 02:04, Ray Hunter wrote: > ... >> The idea being that authorized persons e.g. law enforcement and network >> managers SHOULD be able to correlate activity at a later date (for legal >> compliance, logging, fault finding etc.) whilst an attacker or >> unauthorized person SHOULD NOT. > > If you were a blogger sitting in an Internet cafe in a country governed > by a repressive regime, you would probably hold a different view.
If the regime controls the local-link, then as far as address-tracking is concerned, you're toast. -- They could sniff the network and log the address->MAC mappings, have RAs require you to do DHCPv6 and then have DHCPv6 assign you a constant address, etc. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------