Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo-v4traversal-06.txt
Hesham Soliman <hesham@elevatemobile.com> Mon, 01 December 2008 10:33 UTC
Return-Path: <mext-bounces@ietf.org>
X-Original-To: monami6-archive@megatron.ietf.org
Delivered-To: ietfarch-monami6-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
by core3.amsl.com (Postfix) with ESMTP id 6D4403A69D3;
Mon, 1 Dec 2008 02:33:42 -0800 (PST)
X-Original-To: mext@core3.amsl.com
Delivered-To: mext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
by core3.amsl.com (Postfix) with ESMTP id 386D73A6847;
Mon, 1 Dec 2008 02:33:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.76
X-Spam-Level:
X-Spam-Status: No, score=-2.76 tagged_above=-999 required=5 tests=[AWL=-0.173,
BAYES_00=-2.599, GUARANTEED_100_PERCENT=0.012]
Received: from mail.ietf.org ([64.170.98.32])
by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id cYeJ8LTkcu4h; Mon, 1 Dec 2008 02:33:40 -0800 (PST)
Received: from smtp-1.servers.netregistry.net (smtp.netregistry.net
[202.124.241.204])
by core3.amsl.com (Postfix) with ESMTP id 201E93A63EC;
Mon, 1 Dec 2008 02:33:39 -0800 (PST)
Received: from [124.190.106.160] (helo=[192.168.0.187])
by smtp-1.servers.netregistry.net protocol: esmtpa (Exim 4.63 #1
(Debian)) id 1L765n-0007sQ-CN; Mon, 01 Dec 2008 21:33:29 +1100
User-Agent: Microsoft-Entourage/12.14.0.081024
Date: Mon, 01 Dec 2008 21:33:15 +1100
From: Hesham Soliman <hesham@elevatemobile.com>
To: Colin Perkins <csp@csperkins.org>
Message-ID: <C55A089B.A7D6%hesham@elevatemobile.com>
Thread-Topic: tsv-dir review of draft-ietf-mext-nemo-v4traversal-06.txt
Thread-Index: AclToDehY9f7D5O2B0SDZCHZLI7C0g==
In-Reply-To: <5B953275-471A-40FF-B923-EB697AA96CA8@csperkins.org>
Mime-version: 1.0
Cc: TSV Dir <tsv-dir@ietf.org>, ietf@ietf.org, "mext@ietf.org" <mext@ietf.org>
Subject: Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo-v4traversal-06.txt
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mext>,
<mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>,
<mailto:mext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: mext-bounces@ietf.org
Errors-To: mext-bounces@ietf.org
Thanks Colin, I agree with your rationale but I wonder if we need to support every broken device out there. In any case, if we have to, I prefer to require encryption than to add the XORED address option. I'd like to hear what people in MEXT think about this, comments from MEXT? Hesham On 1/12/08 9:13 PM, "Colin Perkins" <csp@csperkins.org> wrote: > On 1 Dec 2008, at 09:00, Hesham Soliman wrote: >>>> => Well, I'm not sure how a NAT can do that. You mean the NAT will >>>> parse the binding update message deep inside the IPv6 extension >>>> header in the inner IP packet? This is where the original address >>>> is preserved. To do that, a NAT would have to understand the >>>> various MIPv6 options, and if it did, it would know not to do >>>> that :) The inner header is IPv6, so a NAT should not touch that. >>> >>> My understanding from the STUN work is that NATs have been observed >>> which rewrite any sequence of four aligned bytes matching the source >>> IP address, irrespective of its location within the packet (section >>> 15.2 of RFC 5389). >> >> => Sounds freightning! May be we need to mandate encryption and >> hope that no 4-byte sequence matched the IP address? What do they >> do with encrypted packets? How do they know they're encrypted? > > One would assume these broken devices will potentially corrupt > encrypted packets, the same as they will potentially corrupt any > other packet. Hiding the source address when it appears in the > payload (either by encryption, or using some trivial obfuscation as > does STUN) simply reduces the probability of such corruption so it's > no longer 100% guaranteed that the payload will be mangled. _______________________________________________ MEXT mailing list MEXT@ietf.org https://www.ietf.org/mailman/listinfo/mext
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Hesham Soliman
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Colin Perkins
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Hesham Soliman
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Hesham Soliman
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Colin Perkins
- Re: [MEXT] [tsv-dir] tsv-dir review of draft-ietf… Magnus Westerlund
- Re: [MEXT] [tsv-dir] tsv-dir review of draft-ietf… Colin Perkins
- Re: [MEXT] [tsv-dir] tsv-dir review of draft-ietf… Matt Mathis
- Re: [MEXT] [tsv-dir] tsv-dir review of draft-ietf… Rémi Denis-Courmont
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Jari Arkko
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Colin Perkins
- Re: [MEXT] tsv-dir review of draft-ietf-mext-nemo… Dan Wing