Keith, I'm doing my best to follow this thread, but one item in your note to Rich Draves has me confused:
Keith Moore wrote:
furthermore if you have multiple prefixes on a net, some of which
are trusted and some which are not, then you have to configure
each of those apps to tell them to use the trusted prefix.
Can you say more about how this could occur in deployment scenarios? Prefixes come from router advertisements, stateful delegations (e.g., DHCPv6), or manual config - right? Are you saying that applications need to be configured in order to know which prefixes are legitimate and which are rogues? This sounds to me like either a site security issue or a requirement for an application-level prefix authentication mechanism - either way, it seems unrelated to the subject matter of this thread. Fred [EMAIL PROTECTED] -------------------------------------------------------------------- IETF IPng Working Group Mailing List IPng Home Page: http://playground.sun.com/ipng FTP archive: ftp://playground.sun.com/pub/ipng Direct all administrative requests to [EMAIL PROTECTED] --------------------------------------------------------------------
