Privacy Considerations for IPv6 over Networks of Resource-Constrained Nodes
This is an older version of an Internet-Draft that was ultimately published as RFC 8065.
Expired & archived
|Last updated||2016-04-20 (Latest revision 2015-10-18)|
|RFC stream||Internet Engineering Task Force (IETF)|
|Additional resources||Mailing list discussion|
|Stream||WG state||WG Document|
|Document shepherd||Gabriel Montenegro|
|Send notices to||"Gabriel Montenegro" <Gabriel.Montenegro@microsoft.com>|
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
This document discusses how a number of privacy threats apply to technologies designed for IPv6 over networks of resource-constrained nodes, and provides advice to protocol designers on how to address such threats in IPv6-over-foo adaptation layer specifcations.
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)