[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

durand-v6ops-natpt-dns-alg-issues-00 comments



Hi,

A few comments.  There seems to be some bashing of DNSALG, but there is a 
draft on how to fix those issues too -- and AFAIR, it fixes adequately 
most of the issues.  Instead bashing DNS-ALG and advocating NAT-PT++ 
perhaps a more comprehensive look at the subject would be useful.

One robustness comment below, the rest are editorials.

5.2 Robustness of NAT-PT with DNS-ALG

   The DNS-ALG needs to actively monitor the NAT-PT boxes, to detect the
   potential failure of one of them and remove it from the list of valid
   translators. In practice, this means that the prefix associated to
   that translator will not be used anymore by the DNS-ALG to respond to
   DNS queries.  For this to work, the DNS-ALG must set the TTL of the
   DNS answer to zero and user applications are expected to respect that
   TTL, i.e. not cache the name to address mapping, even for a short
...

==> same routing the prefix-approach applies with DNS-ALG too.

editorials
----------

Status of this memo

   This memo provides information to the Internet community.  It does
   not specify an Internet standard of any kind.  This memo is in full
   conformance with all provisions of Section 10 of RFC2026 [RFC2026].

==> boilerplate is missing newlines etc.

1. Introduction:  non DNS ALG solution

   Note: This section does not provide a complete description of a non
   DNS ALG solution for NAT-PT, but provide a quick overview of such a
==> s/provide/provides/

   solution to understand better the discussions of the next sections.
==> s/understand better/better understand/

   The way this is envision to work is that an IPv6 application running
==> s/envision/envisioned/

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings