Dow,

> - If a "consenting nodes only" model is adopted, is any arbitrary
> behavior by those consenting nodes deemed acceptable by the
> non-consenting nodes?  Previous discussions seemed to indicate that at
> least some folks would answer "no" to this question.
>
> In other words, how is using RH 253 between consenting nodes (allowed
> to behave arbitrarily) any different than allowing consenting nodes to
> run RH0, and non-consenting nodes disabling RH0?  One difference
> (cynical hat on) is that opponents of source routing now force
> proponents to get new functionality implemented and deployed - only to
> have the same debate a few years from now when it comes time to
> standardize the functionality.
>
I think any proposal for special re-forwarding to new destination,
based on RH0, RHx, or anything else would have to be evaluated
by its merits. Some of the questions that would be asked in
review include, for instance, how is consent obtained from
the participants obtained, and how can the consenting nodes
ensure that they are not used as part of an attack (e.g.,
amplification).

Jari


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to