On Jan 8, 2009, at 10:27 PM, Naiming Shen wrote:
Hi Ben,
Thanks for the review. Just to comment on the "Security Considerations" you referred to below.
Most of those information probably is not sensitive, if a router allows a traceroute packet which gives the responder an option to authenticate the source of the request, that if used correctly, also implies the intermediate devices between the source and this responder. Or a local policy on the responder can be defined to verify the domain/subnet of a set of addresses which are allowed to receive those sensitive add-on information.
Okay, good enough for me--a sentence or two to that effect might be helpful, particularly about intermediate devices.
Thanks!
Ben.
|
_______________________________________________
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf