Re: Resolution to open comments on ICMP Name Lookups

2005-11-16 Thread JINMEI Tatuya / 神明達哉
> On Thu, 17 Nov 2005 08:43:29 +0200 (EET), > Pekka Savola <[EMAIL PROTECTED]> said: >> Issue 1: Restrict operation of the protocol to link-local use. >> >> Resolution: >> The consensus is to retain the more flexible multi-hop capability. >> An additional sentence or two will be added to

Re: Resolution to open comments on ICMP Name Lookups

2005-11-16 Thread Pekka Savola
On Wed, 16 Nov 2005, Brian Haberman wrote: Issue 1: Restrict operation of the protocol to link-local use. Resolution: The consensus is to retain the more flexible multi-hop capability. An additional sentence or two will be added to the Security Considerations section recommending the

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread James Kempf
I agree. I think any allocation should be considered experimental, particularly since there is a possibility that the identifiers might become longer in the future. However, it is also possible that 128 bit identifiers might become standard practice. At this point, we don't really know.

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread Erik Nordmark
Pekka Nikander wrote: Geoff, to quote my longer message http://www1.ietf.org/mail-archive/web/ipv6/current/msg05900.html, "I fully agree with you that a new identifier name space should not be mixed with any existing locator space." Hence, from what I called "an ideal architectural point of

RE: Resolution to open comments on ICMP Name Lookups

2005-11-16 Thread Durand, Alain
> > Issue 3: Discovery of tunnel endpoints. > > Resolution: > This change will be made and will be based on the text proposed > http://www1.ietf.org/mail-archive/web/ipv6/current/msg05674.html I'm not sure this is such a good idea. A) there are may kinds of tunnels, like IPv6/UDP/I

Re: Resolution to open comments on ICMP Name Lookups

2005-11-16 Thread Jeroen Massar
Brian Haberman wrote: > Issue 3: Discovery of tunnel endpoints. > > Resolution: > This change will be made and will be based on the text proposed > http://www1.ietf.org/mail-archive/web/ipv6/current/msg05674.html I missed out on the discussion of the above, but I do hope that there is

Resolution to open comments on ICMP Name Lookups

2005-11-16 Thread Brian Haberman
All, As promised during the IPv6 WG session in Vancouver, this is my attempt to resolve the open issues with the ICMP Name Lookup draft. From my review of my e-mail and the mailing list archive, there are three open issues on the table. I will list each and propose a resolution to each.

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread Tony Li
As I wrote, I can't see how we could convince the world from going from where we are now to a world that requires people to change their network stack, add a new piece of infrastructure, and to change applications at the same time. That won't happen, any more. Even a "killer application"

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread Julien Laganier
On Wednesday 16 November 2005 15:14, Francis Dupont wrote: > Please note KHIs have other usages than HIP... Off course! That was just an usefulness example of having identifiers allocated out of the locator space as a transition tool: it makes possible to use at the same time identifiers and loc

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread Francis Dupont
Please note KHIs have other usages than HIP... Regards [EMAIL PROTECTED] PS: one of the strong points of the KHI drafts is it should cover more than one usage (if possible all usages) for crypto generated identifiers which look like addresses (so called "not routable addresses") for the API. --

Re: [Int-area] Re: KHIs and SHA-256

2005-11-16 Thread Julien Laganier
On Tuesday 15 November 2005 23:42, Erik Nordmark wrote: > Pekka Nikander wrote: (...) > > 2a. Implement KHIs on the top of SHIM6 > >- changes stack but minimally from 1a, perhaps not at all > >- does not change applications > > I don't understand the last point. A KHI couldn't be used in

draft-ietf-ipv6-2461bis-05.txt

2005-11-16 Thread Vishwas Manral
Hi, I think I found a small typo in the draft: - asymmetric reachability - a link where non-reflexive and/or non-transitive reachability is part of normal operation. (Non- reflexive reachability means packets from A reach B but packets from B don't re