Sam Hartman wrote:
"Frank" == Frank Ellermann <[EMAIL PROTECTED]> writes:
Frank> Henrik Levkowetz wrote:
>> Please provide more data (off-list) as this seems odd.
Frank> Will do (ordinary moderation bounce), but on list I should
Frank> fix the bogus URLs I've posted here (I fo
> From: Keith Moore
>>> Number portability, after all, only requires a layer of indirection.
>>> We can certainly engineer that!
>> And we have. It's called the DNS.
> no it's not. DNS sucks for that. it's too slow, too likely to be out
> of sync. DNS names are the wrong
> From: Terry Gray <[EMAIL PROTECTED]>
> Would you agree with the thesis that *without* pervasive PI, the future
> of NAT (or some other mechanism for providing address autonomy to
> organizations) is absolutely guaranteed forever (even with v6)?
The use of NAT to provide local ad
Original Message
> From: Keith Moore
>>> Number portability, after all, only requires a layer of indirection.
>>> We can certainly engineer that!
>> And we have. It's called the DNS.
> no it's not. DNS sucks for that. it's too slow, too likely to be ou
I don't know of a status change to IMA in this time interval.
Frank Ellermann wrote:
Henrik Levkowetz wrote:
Please provide more data (off-list) as this seems odd.
Will do (ordinary moderation bounce), but on list I should fix
the bogus URLs I've posted here (I forgot one "gmane", s
On 18-apr-2006, at 13:50, Noel Chiappa wrote:
Now we hear that anything like 8+8 is infeasiable because it's
incompatible
with the installed base (all 17 of them).
18 if the IETF would finally start eating its own dog food...
Let me observe once again that 8+8/GSE is incomplete because it
Keith,
> sort of. MPLS with globally-scoped tags, and a database of
> [course] (think subnet sized) identifer to locator mappings that is
> distributed via BGP. border routers look at the destination host
> identifier, find the set of locators that correspond to it, and pick
> the best locator
> It smells remarkably like pathalias to me ;-)
except that I'm not proposing that border routers do source routing, just that
they map from PI identifiers to PA locators and prepend a header that causes
the payload to be routed to the locator.
Keith
_
On Tue, Apr 18, 2006 at 11:42:27AM -0400, Keith Moore wrote:
> > It smells remarkably like pathalias to me ;-)
>
> except that I'm not proposing that border routers do source routing,
> just that they map from PI identifiers to PA locators and prepend a
> header that causes the payload to be route
> On Tue, Apr 18, 2006 at 11:42:27AM -0400, Keith Moore wrote:
> > > It smells remarkably like pathalias to me ;-)
> >
> > except that I'm not proposing that border routers do source routing,
> > just that they map from PI identifiers to PA locators and prepend a
> > header that causes the payload
On Tue, 18 Apr 2006 14:46:15 -0400, "Theodore Ts'o" <[EMAIL PROTECTED]> wrote:
> On Tue, Apr 18, 2006 at 11:42:27AM -0400, Keith Moore wrote:
> > > It smells remarkably like pathalias to me ;-)
> >
> > except that I'm not proposing that border routers do source routing,
> > just that they map fro
Steven M. Bellovin wrote:
> On Tue, 18 Apr 2006 14:46:15 -0400, "Theodore Ts'o" <[EMAIL PROTECTED]> wrote:
>
>
>> as I recall Erik
>> Fair at Apple used a Cray for that purpose, because he didn't like
>> waiting :-)
>>
>>
> Peter Honeyman optimized my original algorithm considerably; t
Ok, Ok, I probably haven't been paying attention, but...
If a device implements a subset of IPv6, (e.g., no IPsec, no mobile
IP), is it generally understood that this device "implements IPv6"?
Has a standard subset of IPv6 been defined for very low-end devices
that simply can't implement a full I
13 matches
Mail list logo