On 10/05/2016 09:01 PM, George Michaelson wrote:
> As an example the IEEE MAC registry is really only to provide
> uniqueness, but its been demonstrated to act as a passive-capture
> mechanism to identify probable host architecture from on-the-wire
> sniffs. This then leads directly to: "If its a Dell, then I know the
> iDrac default password so I can attempt to see if this is a badly
> configured Dell which has iDrac IPMI on the host address" and like
> attacks.
> 
> Unique identifiers are being used by the cellular provider to offer
> price differentiated service to people on the same basic substrate.
> Which is a poshed-up way of saying you can get a SIM which is dataplan
> for an iPad but if you put it in your phone you are in breach of
> contract over the use of that SIM. I am not personally a fan of this
> legalism, but it is legal, and it is an ism.
> 
> I think there is a fundamental tension between baked in uniqueness,
> probabalistic uniqueness (think ULA) and non-unique state in Layer-2
> and Layer-3

Please see: draft-gont-numeric-ids-generation-01

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492




_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to