In this response, I'm also referring to the latest version of
http://www.netcore.fi/pekkas/ietf/temp/draft-ietf-dnsop-ipv6-dns-issues-05pre.txt
(the one whose MD5 hash value is 0f0dcc920186d1a01f923dd60aac168d).

Easy ones first:

>>>>> On Wed, 7 Apr 2004 11:38:34 +0300 (EEST), 
>>>>> Pekka Savola <[EMAIL PROTECTED]> said:

>> 2. Section 2.2 (Privacy (RFC3041) Address)

(snip)

> Good point.  Revised as follows:

>         <t>Temporary addresses defined in <xref
> target="RFC3041">RFC3041</xref> (sometimes called "privacy addresses")
> use a random number as the interface identifier.  Publishing DNS
> records relating to such addresses would defeat the purpose of the
> mechanism and is not recommended.  If absolutely necessary, a mapping
> could be made to some non-identifiable name, as described in <xref
> target="RFC3041"/>.</t>

Forks for me.  I'd also remove "RFC3041" from the section title:

2.2  Temporary Addresses

but this is not a strong opinion.

>> 4. Section 4.5 (Behaviour of Glue in Mixed IPv4/IPv6 Environments)
>> 
>> (second paragraph)

(snip)

> Yes, the intent was "query name", as the additional length of the  
> packet for other reasons was also discussed a bit.  Possibly this 
> would call for more text?

>        <t>Consider the cases where the query name is so long, the
> number of he additional records (originated from "glue") is so high,
> or for other easons that the response must either be runcated (leading
> to a retry with TCP) or some of the additional data emoved from the
> reply. [...]
 
> I added "query name" there and "or for other reasons" -catchall, but 
> if you have better ideas what to add here, I'm all ears :)

For me, adding "name" to "the query" is enough (in fact, I'm not sure
what "other reasons" are referring to).  But again, it's not a strong
opinion and is up to you.

>> 5. Section 6 (Considerations about Forward DNS Updating)
>> 
>> (second paragraph)
>> Typically forward DNS updates are more manageable than doing them in
>> the reverse DNS, because the updater can, typically, be assumed to
>> "own" a certain DNS name -- and we can create a form of security
>> association with the DNS name and the node allowed to update it to
>> point to a new address.
>> 
>> (this is a mostly editorial comment) I think "security association" is
>> a misleading term here because it sounds like something related to
>> IPsec (but it seems to me that the original intention was more
>> generic).  I guess the authors perhaps tried to express the intention
>> by adding "a form of" before "security association", but the text
>> could explicitly be clearer.

> Yes, this is the intent.  I've changed "security association" to 
> "security relationship" to make it clearer that the terms don't 
> overlap :)

Okay.
 
>> 6. Section 7.5 (DDNS with Dynamic Prefix Delegation)

(snip)

> The wording "at the site where the prefixes are delegated" seems to be 
> unclear.  I've reworded it to "at the site where the prefixes are 
> delegated to" to make it clearer.  I've also tried to clarify the 
> parentheses by spelling it out:

> 7.5  DDNS with Dynamic Prefix Delegation

>    In cases where a prefix, instead of an address, is being used and
>    updated, one should consider what is the location of the server where
>    DDNS updates are made. That is, where the DNS server is located:

>    1.  At the same organization as the prefix delegator.

>    2.  At the site where the prefixes are delegated to.

>    3.  Elsewhere, as specified by the delegated site; this is
>        security-wise typically equivalent to the previous case.

>    On one hand, securing the DDNS relationship for prefix delegation is
>    simpler if DNS server and the prefix delegator are in the same
>    administrative domain, and may be more difficult otherwise.

>    On the other hand, if the DNS server resides where the prefixes are
>    delegated to, it is easier to manage reverse DNS updates as they can
>    be done within a single administrative entity.  Similarly, then
>    configuring the reverse DNS is typically simpler as well (e.g., if
>    one wanted to insert a wildcard record).

The revised text basically looks okay except for one point: I'm not
sure about the rationale of the latter part of case 3: "this is
security-wise typically equivalent to the previous case."

>> 2. Section 6.2 (Dynamic DNS)
>> 
>> (third paragraph)
>> for the hostname; the second must be configured explicitly unless one
>> chooses to trust the IP address -based authentication (not a good
>> idea);
>> 
>> s/address -based/address-based/ ?

> I like how it is at the moment because it's 'IP address'-based rather 
> than just address-based.  But I've changed this as you say (two 
> places) as I think this is rather equivalent in any case.
> (Same for section 7.3.)

Ah, I see.  My comment actually came from consistency with other parts
("address-based" without "IP"), which I thought was natural notation.
If "address -based" was intentional, then I'm fine, though I
personally prefer "address-based".  And, since the latest text matches
my preference, I'm just happy with it.

                                        JINMEI, Tatuya
                                        Communication Platform Lab.
                                        Corporate R&D Center, Toshiba Corp.
                                        [EMAIL PROTECTED]
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to