On Fri, 22 Oct 2004, Suresh Krishnan wrote:
> Hi Pekka/Brian,
> This is the text I added to have a per-prefix enable/disable
> setting. Hope it resolves your issues.
>
> "Additionally, sites might wish to selectively enable or disable the
>use of temporary addresses for some prefixes
Hi Ralph,
* The abstract no longer refers to DHCP.
"Nodes use IPv6 stateless address autoconfiguration to generate
addresses using a combination of locally available information and
information advertised by routers. Addresses are formed by combining
network prefixes with an interfac
Hi Bill,
I have added the following text to include packet sizes and timing
"Please note that an attacker, who is on path, may be able to perform
significant correlation based on
o The payload contents of the packets on the wire
o The characteristics of the packets such as packet si
Hi Pekka/Brian,
This is the text I added to have a per-prefix enable/disable
setting. Hope it resolves your issues.
"Additionally, sites might wish to selectively enable or disable the
use of temporary addresses for some prefixes. For example, a site
might wish to disable tempor
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Version 6 Working Group Working Group of the IETF.
Title : Internet Control Message Protocol (ICMPv6)for the
Internet Protocol Version 6
Comments/changes welcome...
Agenda Bashing Chairs 4
minutes
Document Status Chairs 1
minute
Milestone Updates Chairs 5
minutes
Node Information Queries Chairs
Arvind,
I believe that Inverse Discovery (RFC3122) has its own rules, within its
own scope, which is Inverse Discovery, as opposed to Discovery. These
rules apply generically to the typical users of Inverse Discovery, like
ATM, or Frame Relay.
I hope this helps,
Alex
arvind saproo wrote:
Hi,
Hi Bill,
Can you give me more details or a pointer to such an attack? I will add
add some text and a reference to it.
Thanks
Suresh
On Fri, 22 Oct 2004, BIll Sommerfeld wrote:
>On Fri, 2004-10-22 at 00:05, Suresh Krishnan wrote:
>> I would agree with you that a an attacker can extrapolate a l