Hi Martin,
> So this depends on either concurrent use of the two CIDs,
with that and the "routing based on cid", I would raise the question, if
the usage of the cid turns into a swiss-army-knife?
Therefore it may get larger, and so it gets attractive,
to use it only on the first record, but leav
Hi Hannes,
Let me see if I can clarify then :)
On Fri, Apr 24, 2020, at 18:31, Hannes Tschofenig wrote:
> > Say that a connection spans two network paths. CID A is used on path
> A; CID B is used on path B.
> I guess you are considering a scenario where a device, of the lifetime
> of the commu
Hi Martin,
I have a few questions regarding the attack you mentioned below.
I would like to understand whether it relates to the topic of how the
additional data is constructed and what is included.
> Say that a connection spans two network paths. CID A is used on path A; CID
> B is used on pa