Keith,

I'm doing my best to follow this thread, but one item in your note
to Rich Draves has me confused:

Keith Moore wrote:
furthermore if you have multiple prefixes on a net, some of which
are trusted and some which are not, then you have to configure
each of those apps to tell them to use the trusted prefix.
Can you say more about how this could occur in deployment
scenarios? Prefixes come from router advertisements, stateful
delegations (e.g., DHCPv6), or manual config - right? Are you
saying that applications need to be configured in order to know
which prefixes are legitimate and which are rogues? This sounds
to me like either a site security issue or a requirement for an
application-level prefix authentication mechanism - either way,
it seems unrelated to the subject matter of this thread.

Fred
[EMAIL PROTECTED]


--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to