With all due respect to everyone concerned, there's no way an end user or IT department can buy a bunch of machines based on the text currently contained in this proposed Standard Track document and

1) be able to predict how each machine will behave by defaultin advance of actually plugging it in.

2) be able to effectively manage a machine's behaviour remotely via an IETF defined control mechanism, because the various MAYs and SHOULDs cannot be overridden by the two things that are actually reasonably well defined by the IETF i.e. the prefix policy table + draft-ietf-6man-addr-select-opt-03 for transporting that policy table.

That suggests to me that we're not yet completely on the right track.

IMHO If there's an implementation option in 3484bis, there should always be a corresponding control option in the (prefix) policy table, plus a way to effectively transport that policy table in e.g. draft-ietf-6man-addr-select-opt-03.

Align and package all 3 together, and you have a far better solution.

regards,
RayH

Dave Thaler wrote:
Brian Carpenter writes:
>  >  The wording I propose to add is:
> > > > "There SHOULD be an administrative option to change this preference, if the
>  >       implementation supports privacy addresses.  If there is no such 
option, there
>  >       MUST be an administrative option to disable privacy addresses."
> > > > -Dave
>
>  That works for me. Perhaps there also needs to be a general statement in the 
security
>  considerations that all administrative changes and options MUST be secured 
against illicit use.

Done.   Draft-02  now includes the wording above, and adds a general statement 
in the
security considerations section as you suggested.

-Dave

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to