Personal comments:
Substantive:
------------
I think this is OK to hand over to the proposed successor WG as it
is, but I have a few small comments anyway...
4. Locator set management
...
There are two possible approaches to the addition and removal of
locators: atomic and differential approaches. Atomic approaches
essentially send the complete locators set each time that a
variation
in the locator set occurs. In this case, there is only one message
exchange defined i.e. a message that informs about the new locator
set and an acknowledgment message. Differential messages send the
differences between the existing locator set and the new one. In
this case, a message for adding a new locator and another message
for
deleting locators have to be defined. Both messages can be
acknowledged. The atomic approach imposes additional overhead,
since
all the locator set has to be exchanged each time...
On the other hand, the atomic approach doesn't need acknowledgement
messages, since it can work like soft state - you simply repeat the
atomic message at suitable intervals. That makes it quite a bit
simpler.
2.1 Initial contact
...
...then the M6 protocol has to be used even to perform the
initial contact between the two nodes, starting by the capabilities
detection procedure described in section 2.1.2.
Do you mean section 3.1?
3.1.3 Host-Based Dynamic Discovery
...
For instance, lets assume hosts A and B communicate over two
separate
links without going through the Internet. Lets further assume the
s/let us/lets/
3.1.4 Timing
Capability detection needs to occurr prior to or at the same time
as
s/occur/occurr/
5. Re-homing procedure
...
the Reachability Test is also a mechanism to prevent thrid-party
flooding attacks.
s/third/thrid/
The Reachability Test exchange includes the following packets:
Reachability Test (RT) packet: including the random nonce and
maybe information related to the initial key/cookie/hash chain
s/a random nonce/the random nonce/
[since this is the first time you mention the nonce]
7. Security considerations
The security requirements of each message exchange considered in
this
note are detailed in the same section where the message exchange is
analyzed.
Add something like:
The security threats to be considered are described in [XXX].
Brian