What's the point?

   If you asume unrealistic scenarios to prove your concept, then you
have a problem with your solution.

   The problem is that you have a link where the attacker can have
2^64 different addresses to spoof and it can send NS request at any
rate.

-as


On Wed, Jul 13, 2011 at 4:17 AM, Philip Homburg <pch-6...@u-1.phicoh.com> wrote:
> In your letter dated Tue, 12 Jul 2011 18:32:15 -0400 you wrote:
>>
>>       IMHO I think this would be a vector for other attacks in ND.
>>
>>       You may solve a remote attack but you are opening the door to =
>>local attacks, and a big ones I think.
>
> Let's assume for a moment a 'normal' link (not one with 6000 hosts) and a
> protocol that spreads NS requests by the hosts over a period of say 20 
> seconds,
> how would you then use this as an attack vector?
>
>
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to