On Fri, Dec 17, 2021 at 7:16 PM Dino Farinacci <farina...@gmail.com> wrote:
>
> > If we care about the peer-to-peer property, varying addresses require a 
> > rendezvous process based on a non-varying identifier. It's then the latter 
> > that becomes the handle for surveillance and forensics. The real impact of 
> > CGNAT is to push that factoid into surveillance models; it gives IPv4 the 
> > same privacy assist that temporary addresses give IPv6.
>
> Hosts talk to hosts, I don't care if they are in a data center or two 
> clients. You don't have to distinguish and certainly shouldn't design an 
> address algorithm to distinguish.
>
> As for surveliience and privacy, you can't have both. So pick one.
>

Dino,

>From a user perspective, the choice is clear: privacy and security are
top requirements. We know that payload encryption goes a long way, and
hopefully encryption of the transport layer headers will become
dominant so that intermediate nodes will stop meddling and ossifying
the transport layer. But not everything can be encrypted, the IP
addresses for instance, so providing real security and privacy at the
plaintext network layer should be on the list of features to support
user requirements.

Tom

> And Luigi, you shouldn't trust the devices that are close to you. Even if you 
> manage them you can't trust the vendors that make them.
>
> Dino
>

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to