Fernando

Looks good.

One more technical point, in a raft of lesser ones.

s1
/network, an  infer which addresses/network, and infer which addresses/

/(since the follow different patterns from that of traditional SLAAC
addresses),/
(since they follow different patterns from those of traditional SLAAC
addresses),/

s2
/When employed along "temporary addresses"/
When employed along with "temporary addresses"/

s3
/Identifiers (e.g. such as that specified in /
Identifiers (e.g. such as those specified in/

"Implementations conforming to this specification SHOULD provide the
   means for a system administrator to enable or disable the use of this
   algorithm for generating Interface Identifiers."
As and when the algorithm is disabled or enabled, should the box go back
and regenerate all its addresses?  The previous paragraph implies that
it is a MUST.

" starting from the rightmost bit."
Is that ambiguous?  Would least significant bit be clearer?

"Key lengths of at least 128 bits should be"
Should that be with an entropy of 128 bits?  1024 bit keys are not
always as strong as they first appear:-(

s.7
/limit the ability of an attacker from successfully performing /
limit the ability of an attacker to successfully perform/

Tom Petch

----- Original Message -----
From: "Fernando Gont" <fg...@si6networks.com>
To: "Tim Chown" <t...@ecs.soton.ac.uk>
Cc: <6man-cha...@tools.ietf.org>; "Fernando Gont"
<fg...@si6networks.com>; <6...@ietf.org>
Sent: Friday, May 24, 2013 2:00 AM


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to