Hi, Remi,
Thanks so much for your comments! -- Please find my responses inline
As far as I understand, the attack in §2.1 requires that the victim processes
an IPv4 packets whereby both source and destination are equal to a local
assigned address. Any sane IPv4 stack will reject such a
Hi, folks,
FYI.
Thanks!
Kind regards,
Fernando
Original Message
Subject: New Version Notification for draft-gont-6man-teredo-loops-00
Date: Wed, 8 Sep 2010 00:15:31 -0700 (PDT)
From: IETF I-D Submission Tool idsubmiss...@ietf.org
To: ferna...@gont.com.ar
A new version
Hello,
As far as I understand, the attack in §2.1 requires that the victim processes
an IPv4 packets whereby both source and destination are equal to a local
assigned address. Any sane IPv4 stack will reject such a packet, unless it
comes from the loop back.
The user (or 'root') could