Thanks Suresh and Joel, the text looks good! Thanks for taking the comment
into consideration!

Dhruv

On Sat, Oct 8, 2022 at 6:46 AM Suresh Krishnan <suresh.krish...@gmail.com>
wrote:

> Hi Joel,
>
> On Oct 7, 2022, at 9:07 PM, Joel Halpern <j...@joelhalpern.com> wrote:
>
> Almost, but not quite.  The first part, up to "egress points" is fine.
> But the description of the reasons leaves out one case I think is
> important.  Namely, preventing packets from outside the SR Domain (e.g.
> from an outside attacker) entering the SRv6 Domain.)
>
>
> Ah. Got it. This is covered in more detail in RFC8754 Section 5.1 but it
> makes sense to at least point to it here. Take 2:
>
> NEW:
> In case the deployments do not use this allocated prefix additional care
> needs to be exercised at network ingress and egress points so that SRv6
> packets do not leak out of SR domains and they do not accidentally enter SR
> unaware domains. Similarly as stated in Section 5.1 of RFC8754 packets
> entering an SR domain from the outside need to be configured to filter out
> the selected prefix if it is different from the prefix allocated here.
>
> Thoughts?
>
> Regards
> Suresh
>
> _______________________________________________
> spring mailing list
> spring@ietf.org
> https://www.ietf.org/mailman/listinfo/spring
>
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to