What's the point? If you asume unrealistic scenarios to prove your concept, then you have a problem with your solution.
The problem is that you have a link where the attacker can have 2^64 different addresses to spoof and it can send NS request at any rate. -as On Wed, Jul 13, 2011 at 4:17 AM, Philip Homburg <pch-6...@u-1.phicoh.com> wrote: > In your letter dated Tue, 12 Jul 2011 18:32:15 -0400 you wrote: >> >> IMHO I think this would be a vector for other attacks in ND. >> >> You may solve a remote attack but you are opening the door to = >>local attacks, and a big ones I think. > > Let's assume for a moment a 'normal' link (not one with 6000 hosts) and a > protocol that spreads NS requests by the hosts over a period of say 20 > seconds, > how would you then use this as an attack vector? > > > -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------