Hi Sheng, Ray, On May 31, 2013, at 3:46 AM, Ray Hunter <v6...@globis.net> wrote: [--snip--] > But why are people coming up with these schemes for encoding semantics > in the address prefixes in the first place? That's what I'd like to > understand first and foremost: what lack of functionality is > motivating/forcing these people to adopt such schemes?
+1. In one part of the draft, Section 2.1, it appears to suggest that packets coming in to the border of an SP boundary are "untrusted", therefore existing packet header fields (e.g.: IPv6 TC) cannot be trusted. If incoming packets are untrusted: - why doesn't the SP deploy unicast RPF to drop incoming packets with an illegitimate source IP address/prefix? - more importantly, how is an SP able to _trust_ and somehow enforce that the prefixes that it is handing out (dynamically via DHCP?) are being properly assigned according the policies governing the mapping of semantic prefix <-> user-type/application/security-domain/etc.? -shane -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------