Re: why 0xFFFE is used in the modified EUI-64 format

2006-01-09 Thread JINMEI Tatuya / 神明達哉
> On Mon, 9 Jan 2006 09:51:48 -0800, > Bob Hinden <[EMAIL PROTECTED]> said: > Sorry for not responding sooner. No problem, thanks for the response. > I suspect that at the time we thought that an EUI-48 was equivalent > to MAC-48. Actually until you sent your email I wasn't aware of

RE: Sending ICMP error upon receiving an NA without SLLAO in 2461bis

2006-01-09 Thread Soliman, Hesham
> > The basic issue left is whether we should allow a node to > send an ICMP error > > due to the reception of an NA without the SLLAO. The > reason for sending the > > ICMP error is to inform upper layers that the communication has > > failed. > > It took me a while to figure out wha

FW: [Ipsec] Discrepency RFC4301 and RFC4305

2006-01-09 Thread Vishwas Manral
Title: Re: [Ipsec] Discrepency RFC4301 and RFC4305 Hi John,   I am attaching a new thread regarding the NULL auth algorithm on the IPsec mailing list.   This should probably clarify what I had said in the thread “draft-ietf-ipv6-node-requirements-11.txt”.   Thanks, Vishwas F

Re: why 0xFFFE is used in the modified EUI-64 format

2006-01-09 Thread Bob Hinden
Jinmei, Sorry for not responding sooner. On Dec 9, 2005, at 9:53 AM, ext JINMEI Tatuya / 神明達哉 wrote: I believe this was discussed and clarified before, but I could not find any pointer, so let me ask here... It's regarding the "magic number" of 0xFFFE used in the modified EUI-64 format for th

Re: Sending ICMP error upon receiving an NA without SLLAO in 2461bis

2006-01-09 Thread Thomas Narten
> The basic issue left is whether we should allow a node to send an ICMP error > due to the reception of an NA without the SLLAO. The reason for sending the > ICMP error is to inform upper layers that the communication has > failed. It took me a while to figure out what you are proposing. To summ

Analiyzing the IPv6 list

2006-01-09 Thread Eric Klein
I know that this is a little off topic. As part of my thesis I am trying to analyze who is taking part in making the IPv6 standard.   I have collected some data about the 11 years that the list has been active, and have found that (not surprisingly) 65% of the messages to this list come from

Protocol Action: 'Optimistic Duplicate Address Detection for IPv6' to Proposed Standard

2006-01-09 Thread The IESG
The IESG has approved the following document: - 'Optimistic Duplicate Address Detection for IPv6 ' as a Proposed Standard This document is the product of the IP Version 6 Working Group Working Group. The IESG contact persons are Margaret Wasserman and Mark Townsley. A URL of this Internet-

RE: draft-ietf-ipv6-node-requirements-11.txt

2006-01-09 Thread john . loughney
Hi all, I propose to update the Node Requirements to handle these: RFC2401 is now obsoleted by RFC4301 RFC2402 is now obsoleted by RFC4302 RFC2404 is now obsoleted by RFC4305 RFC2406 is now obsoleted by RFC4303, RFC4305 RFC2407,2408,2409 are now obsoleted by RFC4306 Changes are: "AH [

RE: draft-ietf-ipv6-node-requirements-11.txt

2006-01-09 Thread Vishwas Manral
Hi John, I am referring to the thread and subsequent mails to: http://130.230.52.14/list-archive/ipsec/msg05573.html That said regarding algorithms supported, should we just refer to the RFC's or should we state each of them explicitly. What if the status of algorithm's change (due to some vulner

RE: draft-ietf-ipv6-node-requirements-11.txt

2006-01-09 Thread john . loughney
Vishwas, >I see a few more inconsistencies regarding the same RFC: > > Since ESP encryption and authentication are both optional, support > for the NULL encryption algorithm [RFC-2410] and the NULL > authentication algorithm [RFC-2406] MUST be provided to maintain > consistency with the