Tero Kivinen <[email protected]> wrote: >> hmm. Or, it sees a new beacon, which it can integrity check, and then >> sees the ASN jump forward. This would be the same as if it had slept >> for awhile. >> >> Unless the attacker can continuously *block* the node from seeing the >> latest beacons, and continuously feeds it old beacons, the problem >> should go away.
> Note, that if attacker forces joining node to be offsetted from real
> network, then node will never see real beacon, and attacker has easy
> task of replaying old beacons forever.
Agreed.
{If the attacker is this good at finding non-overlapping bandwidth, then
attacker could instead make $$$$ fast offer network optimization services :-)}
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works | network architect [
] [email protected] http://www.sandelman.ca/ | ruby on rails [
signature.asc
Description: PGP signature
_______________________________________________ 6tisch mailing list [email protected] https://www.ietf.org/mailman/listinfo/6tisch
