On Aug 14, 2013, at 2:27 PM, Brian E Carpenter <brian.e.carpen...@gmail.com> 
wrote:

>> * Section 3:
>>> To the extent that each method of IID creation specifies the values 
>>> of the "u" and "g" bits, and that each new method is carefully 
>>> designed in the light of its predecessors, these bits tend to reduce 
>>> the chances of duplicate IIDs.
>> 
>> Not sure what you mean. Do you mean that *if* each IID-generation method
>> were to use a different combination of "ug", colisions between them
>> would be avoided? If so, I'd argue that since there's no coordination of
>> which combinations should be used for which method, that's unfeasible.
>> For instance, traditional SLAAC uses all combinations (modulo
>> "illegal/unused" combinations of ug).
> 
> The argument is fuzzy and the sentence needs to be rewritten.
> 
> (I would actually suggest that in a pseudo-random method, now that we
> are clear that the bits have no meaning, it would be best to use them to
> provide two more bits of entropy rather than giving them fixed values.)

Good grief. If the bits don't mean anything - and they never did, since nobody 
ever interpreted them except in IETF dancing-on-heads-of-pins discussions - 
could we simply say that they are as random in value as any of the other bits 
in the IID are?
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to