[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: comment on unmanaged analysis presentation/doc
- To: "Erik Nordmark" <Erik.Nordmark@sun.com>,"Jun-ichiro itojun Hagino" <itojun@iijlab.net>
- Subject: RE: comment on unmanaged analysis presentation/doc
- From: "Bound, Jim" <Jim.Bound@hp.com>
- Date: Mon, 23 Sep 2002 10:02:43 -0400
- Cc: <v6ops@ops.ietf.org>
- Delivery-date: Mon, 23 Sep 2002 07:04:02 -0700
- Envelope-to: v6ops-data@psg.com
- Thread-index: AcJjBrTEq3GLuuuhT8WXEMLTO2H+dQAAx5Ew
- Thread-topic: comment on unmanaged analysis presentation/doc
yes they are and this was provided as input to 6to4 from me and others on my team.
/jim
> -----Original Message-----
> From: Erik Nordmark [mailto:Erik.Nordmark@sun.com]
> Sent: Monday, September 23, 2002 9:33 AM
> To: Jun-ichiro itojun Hagino
> Cc: Erik Nordmark; v6ops@ops.ietf.org
> Subject: Re: comment on unmanaged analysis presentation/doc
>
>
> > in that case, what is your comment to 6to4 routers? they accept
> > tunnelled packet from anyone, with no authentication whatsoever.
>
> You mean 6to4 relay (routers)?
> 6to4 routers should only accept tunneled packets from their configured
> relay(s).
>
> I think the relays are quite problematic because of this behavior.
>
> Erik
>
>
>
>