Op 15-12-2020 om 09:10 schreef Erik Kline via Datatracker:
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> [ questions ]]
>
> [ section 3 ]
>
> * I assume it's not a big deal that sometimes the client cannot easily
> tell when its upstream IP address has changed (vis. RFC 7873 S6
> considerations)?
>
> NAT makes it difficult to comply with the MUST for clients stated
> in section 8, but...what should a client do if only has, say, an
> RFC 1918 address and is quite likely to be behind a NAT? If its
> server is also a likely-NAT'd IP then it might presume no NAT between
> the two, but if the server has a global IP address...I suppose it
> can just rotate the per-server cookies once per year?
Thanks Erik,
Indeed, I have added a paragraph to the Security Considerations that
preventing tracking of the public IP of a routing device that performs
NAT is beyond the scope of this document, see:
https://github.com/NLnetLabs/draft-sury-toorop-dns-cookies-algorithms/pull/23/commits/83155e4bfed1afb08611723a13f9ebc045179e63
The nits have been processed too.
Cheers,
-- Willem
> [[ nits ]]
>
> [ section 1 ]
>
> * Final sentence of the final paragraph:
> "in a Client protecting fashion" ->
> "in a privacy protecting fashion"? (to match the abstract)
>
> [ section 8 ]
>
> * "five minute" -> "five minutes"
>
>
>
> _______________________________________________
> DNSOP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop