lpern
Sent: Monday, October 24, 2011 6:34 AM
To: Joel jaeggli
Cc: ipv6@ietf.org
Subject: Re: Fwd: I-D Action: draft-halpern-6man-nddos-mitigation-00.txt
The purpose of the various exchange and triggering mechanism I describe in the
last section are to enable the approach to be used before one has up
t: Re: Fwd: I-D Action: draft-halpern-6man-nddos-mitigation-00.txt
The purpose of the various exchange and triggering mechanism I describe in the
last section are to enable the approach to be used before one has upgraded all
the hosts on the subnet. With the RS retransmission to enable reliable
The purpose of the various exchange and triggering mechanism I describe
in the last section are to enable the approach to be used before one has
upgraded all the hosts on the subnet. With the RS retransmission to
enable reliable discovery by the router, the rest probably become
harmless but un
Sorry meant to actually reply.
I'm curious, essentially what the implications are for interaction
between an existing implimentation in a host, and an nd implimentation
which no longer does discovery.
On 10/24/11 06:21 , Joel jaeggli wrote:
> On 10/21/11 07:44 , Joel M. Halpern wrote:
>> I would
On 10/21/11 07:44 , Joel M. Halpern wrote:
> I would like to call people's attention to the draft below.
> I would like to hear from folks as to what they think of this complement
> to some of the existing work on the ND based denial of service attack.
> I do not intend to present this at the WG me