Hi Ron,
On 05/13/2015 11:39 PM, Ronald Bonica wrote:
> Kathleen,
>
> AFAIK, most IP stacks include code that detects fragmentation overlap
> attacks. (Do I have that right?)
>
> So, reassembly attacks shouldn't be effective whether reassembly is performed
> at the GRE egress or the ultimate dest
Kathleen,
AFAIK, most IP stacks include code that detects fragmentation overlap attacks.
(Do I have that right?)
So, reassembly attacks shouldn't be effective whether reassembly is performed
at the GRE egress or the ultimate destination.
If reassembly is performed at the ultimate destination,
Kathleen Moriarty has entered the following ballot position for
draft-ietf-intarea-gre-mtu-04: Discuss
When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)
Please refer to h