In article <[EMAIL PROTECTED]> (at Sun, 23 Jul 2000 13:21:27 +0900), 
[EMAIL PROTECTED] says:

>       that briefly?  i'm trying to understand your mindset, and it looks
>       like as follows (correct me if i'm wrong):
>       - IPv4 packet on the wire, and native-ipv4-mapped packet on the wire,
>         must go through the same set of accept/deny policy in the kernel.
>         (I believe this is not correct understanding of RFC2553 section 3.7.
>         see below)
>       - this is applications' responsibility to deal with native-ipv4-mapped
>         packet.  (this is close to impossible, from what RFC2553 provides)

        I think:

        - IPv4 packet on the wire, and native-ipv4-mapped packet on the wire,
          should be handled by the same set of accept/deny policy in
          APPLICATIONs.

        - this is KERNEL's responsibility to deal with native-ipv4-mapped
          packet.  KERNEL should drop malicious packet from outside.

You too, Brian (Zill)?

-- 
Hideaki YOSHIFUJI @ USAGI Project  <[EMAIL PROTECTED]>
Web Page: http://www.ecei.tohoku.ac.jp/%7Eyoshfuji/
PGP5i FP: F731 6599 5EB2 BBA7 1515  1323 1806 A96F 5700 6B25 
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to