[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Comments on draft-aoun-v6ops-natpt-deprecate-00



Hi,

I think this draft is a very good summary of the NAT-PT issues, and thus 
we are at a stage where we can discuss what action to take based on the
limitations of NAT-PT as described in the document.   

The key argument for proponents of NAT-PT seems to be that there are valid
"last resort" corner cases for which NAT-PT is the only solution.  It 
would be interesting to see a "usage of NAT-PT" text to make a case for
the defence, so to speak.  Interaction with legacy hardware is one example
of such a corner case.

Minor suggestions for the draft:

- I think the issues in Section 5 should be emphasised more strongly,
  and I recall others have expressed this view on the list.

- Privacy addresses might add an extra complexity for NAT-PT, if each
  node may have a number of active privacy addresses, and may need 
  to still receive communications to non-current privacy addresses that
  have been used in the past, e.g. where the node generates a new 
  privacy address each 24 hours, but still listens on "past" addresses.o
  (I think the NAT-PT + RFC3041 issues need to be thought out, and
  included in this text.)

- Also cite RFC2993 (Architectural NAT Issues) ?

- The NAT-PT issue list is interesting in that it can also be used to
  measure transport or application layer proxying limitations (which
  may also differ in aspects such as raw performance/throughput, but
  that I think is not in scope here).   Some issues are generic with
  any layer translation, e.g. single point of failure.

- There has been some usage of NAT-PT back-to-back to connect IPv6
  only islands across IPv4 only networks.

- A typo "appplied" in the Introduction

Cheers,
-- 
Tim