> Therefore we feel that on size- and power-constrained
> devices one should select the implemented security
> mechanisms based on the requirements of the applications
> rather than a general rule. The general rules aren't
> very good if in the end the application RFC you were running
> would demand something else than the general rule, or if
> the deployment at the other end was something else.

This seems to presume that you can predict in advance all of the
applications that a user will wish to execute on a particular node. Can you
do that?

Also, please note well that the 'deployment at the other end' won't be
'something else' if we get IPsec in every IPv6 node. I thought that was the
whole point....

Regards,
Mat.
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to