Pekka Savola wrote:
[..] However, we've concluded that configuring the tunnel source address does provide utility.
Outside those boundaries there is no utility, or at least none was spelled out in the spec.
[...]It would force the implementors to add such checks.
The check falls nicely into place with the selection of the route and outgoing interface.
That might be
unfeasible e.g., if a router has, e.g, 100, 1000, or 10000 IPv4
addresses.
If a router has that many addresses, rest assured it has also the appropriate mechanism to match quickly anyone of them.
It would add an additional requirement to the spec
A general requirement for any RFC is to have NO protocol BUGS. As a DRAFT standard, that becomes A MAJOR requirement. Additionally, it MUST NOT introduce bugs that didn't exist in the previous incarnation of the document.
(i.e., make the spec more complex).
document and putting it through IESG evaluation again.
Don't you think the IESG would like to do a reevaluation anyway?
[...] The implementer's issue isn't any different than establishing a TCP connection, where a source address assigned to the node needs to be selected. So I think that is a red herring.
[...] Why do you assume that the administrator *needs* to read the specification?
But the specification is not only for the administrator.
The administrator learns that he can set up IPv6-in-IPv4 tunnel using command X (and it's suboptions), from the vendors documentation, man pages, or whatever.
There he sees guidance that he can provide the source and destination address of the tunnel.
Without any description, it is obvious that the administrator who wishes to set up a tunnel from node A must configure the source address from node A as a source address,
or just leave it empty -- and then it's automatically determined.
This is just routing 101:
if you don't put in a right source address, the return packets don't get to you and it won't work.
This is not acceptable...
[...]
Regards, Alex
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature