[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Fwd: I-D ACTION:draft-vandevelde-v6ops-nap-01.txt]



Hi,

A couple of personal comments. In short I think the doc is in pretty good shape. I think the target audience of this document is mainly out-of-the-IETF folks who may not be all that v6-savvy. I call this a "techno-political document", and hence important.

substantial
-----------

11.  References

11.1  Normative References

11.2  Informative References

==> Normative references section should nonempty.  I suggest moving at least
RFC1918, RFC2663, RFC2461, RFC3022, RFC2993, RFC3027, RFC3041, RFC3315,
RFC3484, RFC3633, draft-ietf-v6ops-renumbering-procedure and
draft-ietf-ipv6-unique-local-addr up there.

semi-editorial
--------------

 However, if a site is connected to its ISPs via NAT
   boxes, only those boxes need to deal with multihoming and renumbering
   issues.

==> s/only/sometimes only/ -- for small SOHOs the above is typically true,
but if you put e.g. servers inside the NAT, you will need to deal with these
issues in other boxes as well..?

   While the primary implementation and source of randomized RFC 3041
   addresses is expected to be from end systems running stateless
   autoconfiguration, there is nothing that prevents a DHCP server from
   running the RFC 3041 algorithm for any new IEEE identifier it hears,
   then remembering that for future queries.  This would allow using
   them in DNS for registered services since the assumption of a server
   based deployment would be a persistent value that minimizes DNS
   churn.

==> I'm not sure what the last sentence tries to say, in any case, I think
it's at least partially incorrect.  You can do DNS updates with RFC3041
addresses without DHCP as well.  This sentence seems to be hinting that DHCP
provides some exceptional otherwise unttainable features with RFC3041
addresses.

   ULAs have the following characteristics:
   o  Globally unique prefix
      *  Allows networks to be combined or privately interconnected
         without creating any address conflicts or requiring renumbering
         of interfaces using these prefixes
      *  If accidentally leaked outside of a network via routing or DNS,
         there is no conflict with any other addresses

==> it should be clarified that this Globally unique prefix characteristic
is *compared to RFC1918*, not compared to IPv6 global prefixes!  It is not
clear whether you're comparing against IPv4 privates or IPv6 globals..

 There is no reason that rack mounted devices shouldn't be
   considered mobile nodes to mask the internal topology.  It looks
   equivalent to running a VPN to a central server, however it does not
   involve any encryption or significant overhead.

==> s/shouldn't/couldn't/ otherwise this looks weird??
==> this does raise some SPoF concerns however..

   o  The technology to enable source-routing on a network
      infrastructure has been enhanced to allow this feature to
      function, without impacting the processing power of intermediate
      network devices.  The only devices impacted with the
      source-routing will be the source and destination node and the
      intermediate source-routed nodes.  This impact behavior is
      different if IPv4 is used, because then all intermediate devices
      would have had to look into the source-route header.

==> again, this is not correct AFAIK.  IPv4 source routing can be used in a
similar "loose" mode as IPv6, so there is no technical differenceto IPv6
source routing.

editorial
---------

   components.  The longterm solution is a single network without usage

==> s/longterm/long term/

   routing prefix subnet-id part (SID) and an interface identifier part

==> s/prefix/prefix,/

   Randomizing the IID, as defined in RFC 3041, only precludes tracking
   of the lower 64 bits of the IPv6 address.  Masking of the subnet ID
   will require additional approaches as discussed below in 3.4.
   Additional considerations are discussed in [17].  Providing privacy
   for a subnet ID will require different technology.

==> there seems to be duplication with the last two sentences?  Just remove
the last one?

   device like a Mobile IPv6 Home Gateway.

==> s/Gateway/Agent/

   As a simple gateway, the device has the role of managing both packet
   Routing and local address management.

==> s/Routing/routing/

What one does when topology
   probing is to get an idea of the available hosts inside an
   enterprise.

==> this sentence is hard to parse, and can be written simpler.  Reword.

   masked node using the ULA as a COA This truly masks the internal

==> s/COA/COA./

  o  The third is the IP addresses (single or blocks) that they assign
      to customers.  These can be registered addresses (usually given to
      category a and b and sometimes c)

==> you didn't spell out which category is which?  Not sure what you're
referring to..

   devices.  When looking in chapter 2.3 of RFC3314 'Recommendations for
   IPv6 in 3GPP Standards  September 2002' [9] it is found that the IPv6

==> remove "September 2002" ?

      As an alternative some work in Mobile IP to define a policy
   message where a mobile node would learn from the home agent that it
   should not even try to inform its correspondent about route
   optimization (and thereby expose its real location) would allow a
   border home agent using internal tunneling to the logically mobile
   node (potentially rack mounted) to completely mask all internal
   topology while avoiding the strain from a large number of host routes
   in the IGP.

==> that's one helluva long sentence.  Split to 2-3 ?

   o  Initial section of -00 draft 2.6 and 4.6 have been aggregated into
      a new Qcase studyR section 5.

==> weird chars around "case study"

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings