Op 15-12-2020 om 09:10 schreef Erik Kline via Datatracker:
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> [ questions ]]
> 
> [ section 3 ]
> 
> * I assume it's not a big deal that sometimes the client cannot easily
>   tell when its upstream IP address has changed (vis. RFC 7873 S6
>   considerations)?
> 
>   NAT makes it difficult to comply with the MUST for clients stated
>   in section 8, but...what should a client do if only has, say, an
>   RFC 1918 address and is quite likely to be behind a NAT?  If its
>   server is also a likely-NAT'd IP then it might presume no NAT between
>   the two, but if the server has a global IP address...I suppose it
>   can just rotate the per-server cookies once per year?

Thanks Erik,

Indeed, I have added a paragraph to the Security Considerations that
preventing tracking of the public IP of a routing device that performs
NAT is beyond the scope of this document, see:
        
        
https://github.com/NLnetLabs/draft-sury-toorop-dns-cookies-algorithms/pull/23/commits/83155e4bfed1afb08611723a13f9ebc045179e63

The nits have been processed too.

Cheers,
-- Willem

> [[ nits ]]
> 
> [ section 1 ]
> 
> * Final sentence of the final paragraph:
>   "in a Client protecting fashion" ->
>   "in a privacy protecting fashion"? (to match the abstract)
> 
> [ section 8 ]
> 
> * "five minute" -> "five minutes"
> 
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to