Re: Why IPv6 is a must?

2001-11-13 Thread Erik Nordmark
A locator by definition must describe a precise location within a network, such that any router will be able to forward traffic towards that network using only the information in locator. Sean, Towards the network/link or towards the node? In 8+8 the top 8 bytes are just the locator for

Re: namedroppers mismanagement, continued

2002-11-28 Thread Erik Nordmark
Bush imposed his mailing-list control methods without IESG approval, in violation of RFC 2418, section 3.2. Dan, The spam filtering applied to the namedroppers list is consistent with the IESG policy on spam control at http://www.ietf.org/IESG/Statements.html What's stopping him from

Re: namedroppers mismanagement, continued

2002-11-28 Thread Erik Nordmark
Anyways, if the admin really considers it impolite (I don't), then maybe that admin should send the user an opt-in (or opt-out) notice before (or after) adding the user to the pre-approved list of posters. (Note: for the subscribers list, the policy should be opt-in). This is easily

Re: namedroppers mismanagement, continued

2002-11-28 Thread Erik Nordmark
I don't care whether Bush's decisions can be adequately explained by stupidity. The decisions shouldn't be made by hand in the first place. The only acceptable ways to process a message to a standardization mailing list are (1) to immediately pass it through unchanged to the subscribers

Re: namedroppers mismanagement, continued

2002-11-29 Thread Erik Nordmark
- in the current situation, even postings from occasional posters are being blocked. and when postings are blocked, the message is terse and cryptic (even insulting) and contains no clue about how to workaround the problem Do you have specific recent examples of this? If it is the

Re: Bind 9 AXFR Modification vs AXFR Clarification

2003-02-21 Thread Erik Nordmark
Apparently, you aren't even aware that your changes will make all non-bind 9 servers non-compliant. Had you been aware of that, it seems you would have brought this proposal forward something like 3 years ago, before releasing Bind 9, and before publishing a book on the subject. A data

Plenary slides on multihoming and ID/locator separation

2004-03-08 Thread Erik Nordmark
Some folks have asked for the slides I presented in the Thursday plenary. Harald has made them availble at http://www.alvestrand.no/ietf/korea/IETF59-multihome.pdf until they appear in the IETF proceedings at ietf.org Erik

Re: FW: Why?

2005-03-10 Thread Erik Nordmark
Tony Hain wrote: Why are we wasting effort in every WG and research area on NAT traversal crap??? FWIW I'm also concerned that we are doing too many different NAT traversal protocols. It should be sufficient to just define how IPv6 is tunneled across NATs and start using more IPv6 in the

Re: A New BoF [16ng BoF: IPv6 over IEEE 802.16(e) Networks]

2005-09-26 Thread Erik Nordmark
Can IETF participants freely access the 802.16 and WIMAX documents, so that we can understand what this thing is before we have a BoF? (That's been a sticking point for previous BoFs relating to other technologies.) Erik ___ Ietf mailing list

Re: [Autoconf] Last Call: draft-ietf-autoconf-adhoc-addr-model (IP Addressing Model in Ad Hoc Networks) to Informational RFC

2010-03-24 Thread Erik Nordmark
On 02/19/10 05:42 AM, The IESG wrote: The IESG has received a request from the Ad-Hoc Network Autoconfiguration WG (autoconf) to consider the following document: - 'IP Addressing Model in Ad Hoc Networks ' draft-ietf-autoconf-adhoc-addr-model-02.txt as an Informational RFC I read this

Re: [Autoconf] Last Call: draft-ietf-autoconf-adhoc-addr-model (IP Addressing Model in Ad Hoc Networks) to Informational RFC

2010-03-26 Thread Erik Nordmark
On 03/26/10 11:04 AM, Jari Arkko wrote: Erik, First of all, the document is *an* addressing model for ad hoc networks. It does not claim to be the only model. For instance, during working group discussions it also became apparent that link local addresses could also be employed, albeit -- as

Re: Secdir review of draft-ietf-isis-trill

2010-12-17 Thread Erik Nordmark
On 12/17/10 12:55 PM, Sam Hartman wrote: However, it comes very close. If I understand Is-IS security correctly, the only attack that we would expect a routing protocol to deal with that it does not is replays. (IS-Is is no worse than anything else here.) The impact of replays is a denial of

Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA

2013-09-09 Thread Erik Nordmark
On 9/5/13 8:28 PM, Brian E Carpenter wrote: What we lack is not the technology, it is demand for deployment. Exactly, and that is not actionable in the IETF. Brian, Some years back when we saw the lack of IPv6 deployment we started with some IPv4-free plenary time slots - eating our own