Jari Arkko wrote:
> ...
> The difference is that when we speak about routing-related
> attacks, a modification of a header can be done by MitMs,
> but if the MitMs change the addresses, the whole attack
> is changed. For instance, if the intent of the attack was
> to install a BCE at www.cnn.com for my laptop's traffic to
> be directed somewhere else, changing the address results in
> the BCE entry being installed for someone else. I.e., an
> attacker can't redirect my traffic anywhere. Similarly,
> if stationary nodes have the 'don't accept RR' bit on then
> they will not be vulnerable to any MIPv6 based attacks.
>
Given the absurdity of this claim you clearly don't understand the power
of MitM. There is nothing that directs traffic 'somewhere else', because
the bit being flipped will be routed to the same wire as the original
address. Since the MitM is capable of flipping the bit off in the src,
it can bid down the association, then on the return traffic it can flip
the bit back on in the dst. If the CN really cares about verifying an
address (which it should for any BU), it has a mechanism in the CGA to
check. A bit didn't help make that easier.

Tony



--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to