Tero Kivinen <[email protected]> wrote:
    >> hmm.  Or, it sees a new beacon, which it can integrity check, and then
    >> sees the ASN jump forward.  This would be the same as if it had slept
    >> for awhile.
    >> 
    >> Unless the attacker can continuously *block* the node from seeing the
    >> latest beacons, and continuously feeds it old beacons, the problem
    >> should go away.

    > Note, that if attacker forces joining node to be offsetted from real
    > network, then node will never see real beacon, and attacker has easy
    > task of replaying old beacons forever.

Agreed.

{If the attacker is this good at finding non-overlapping bandwidth, then
attacker could instead make $$$$ fast offer network optimization services :-)}

-- 
]               Never tell me the odds!                 | ipv6 mesh networks [ 
]   Michael Richardson, Sandelman Software Works        | network architect  [ 
]     [email protected]  http://www.sandelman.ca/        |   ruby on rails    [ 
        

Attachment: signature.asc
Description: PGP signature

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to