> Therefore we feel that on size- and power-constrained > devices one should select the implemented security > mechanisms based on the requirements of the applications > rather than a general rule. The general rules aren't > very good if in the end the application RFC you were running > would demand something else than the general rule, or if > the deployment at the other end was something else.
This seems to presume that you can predict in advance all of the applications that a user will wish to execute on a particular node. Can you do that? Also, please note well that the 'deployment at the other end' won't be 'something else' if we get IPsec in every IPv6 node. I thought that was the whole point.... Regards, Mat. -------------------------------------------------------------------- IETF IPng Working Group Mailing List IPng Home Page: http://playground.sun.com/ipng FTP archive: ftp://playground.sun.com/pub/ipng Direct all administrative requests to [EMAIL PROTECTED] --------------------------------------------------------------------
