[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: WG Last Call: draft-ietf-v6ops-unman-scenarios-00.txt
Here is my review of draft-ietf-v6ops-unman-scenarios-00.txt,
I have no concern but some comments and editorial remarks.
Comments
I have no concern about the limitation to a single subnet as soon
as it is clear from the beginning (and it is the case).
A very common scenario (the one I use personally) is a VPN (with
IPsec or SSH or both) which injects the home network into a virtual
home site. I don't know if this should be explicitly considered but
at least it should be put out of the scope of the document by
a statement in the introduction.
A DNS server can be recursive (i.e., be a "DNS proxy") or not. As
almost all resolvers don't support recursion them selves, this is
an important detail when the DNS crosses IP version domains.
Typos & co:
2 Topology
(ISP)connection. Several hosts are connected to the subnet:
=> (ISP) connection. Several hosts are connected to the subnet:
3 Applications
types of applications: local, client, servers and peer-to-peers.
=> types of applications: local, client, server and peer-to-peer.
3.1 Local applications
of the unmanaged network. Typical examples are the sharing of file
=> of the unmanaged network. Typical examples are the sharing of files
3.2 Client applications
Local applications tend to work correctly in IPv4 unmanaged
=> Client applications tend to work correctly in IPv4 unmanaged
4.2 Requirements of client applications
servers. In an IPv6 network, the client must be able to locate a DNS
server.
=> perhaps this is the good place to introduce recursive DNS servers?
Note: in BIND the recursion part is in the server itself, i.e., even a
caching only server adds recursion support to the resolver but the
scenarios are about *unmanaged* networks, i.e., IMHO without any
BIND server by default.
4.2.1 Privacy requirement of client applications
=> I agree with the conclusion.
4.4 Requirements of server applications
=> insert a page break between 4.3 and 4.4 sections.
5.1.2 Addresses and connectivity in Case A
to deploy, and light weight; it will have to involve tunneling over
UDP, as this is the practical way to traverse a NAT. If servers are
=> s/UDP/& or TCP/
(SSH is a good example of TCP tunneling which works through NATs)
5.2.1 Application support in Case B
all, and to just continue fielding IPv6-only devices. The remaining
=> please replace "fielding" by a more common term.
5.2.2 Addresses and connectivity in Case B
be assessed in a companion memo [EVAL].
=> as soon as there is a reference to [EVAL], there should be others.
5.2.3 Naming services in Case B
compared in the evaluation draft.
=> add [EVAL].
5.4.1 Application support in Case D
by providing IPv4-over-IPv6 tunnels. Our analysis concludes that a
tunnel service will be vastly preferable.
and
The proper alternative to application relays and network address
translation is the provision of an IPv4-over-IPv6 service.
=> I agree (:-)!!!
5.4.3 Naming services in Case D
The gateway should be able to act as a "DNS proxy" for the remaining
IPv4 only hosts.
=> this "DNS proxy" is in fact a recursive DNS server running on a dual
stack node.
11 References
=> should be split into two sections, etc.
[EVAL] Evaluation of Transition Mechanisms for Unmanaged Networks,
work in progress.
=> please add the name of the last version of the draft.
=> there is a [6TO4] in 5.3.2.
Table of Contents:
=> move to front.
Thanks
Francis.Dupont@enst-bretagne.fr