Nowadays, since people are always keen to look for so called "cheap, fast, ...," wifi access points in public places like restaurant, it is reported that some forged access points appear to attract people to access Internet network through them where the private information like credit card number and password may be collected by those bad access points, which may be an issue needing consideration when deploying mDNS.
Guangqing Deng CNNIC From: Henning Rogge Date: 2014-04-11 14:41 To: Douglas Otis CC: dnssd; HOMENET; Don Sturek; Dave Taht Subject: Re: [dnssd] [homenet] IETF-89 WG meeting minutes On Fri, Apr 11, 2014 at 1:53 AM, Douglas Otis <[email protected]> wrote: > mDNS is not easily deployed at large scale over wireless without filtering. > Wifi has improved by offering mitigation strategies like multicast queuing > per N beacons and multicast specific filters. Even so, these strategies are > unlikely needed at home. I make extensive use of mDNS within a dense > wireless spectrum containing dozens of nearby access points without > difficulty while transferring multiple HD+ streams. I would be interested in > knowing what problems you are experiencing within your home. Its not only mDNS, its also ARP, ICMPv6 and other "linklocal multicast" protocols that work badly over large Wifi linklayer domains. Linklocal normally means "fast, cheap, atomic, in-order"... if you replace it with a large wireless layer-2 domain, it becomes something very different. Henning Rogge _______________________________________________ dnssd mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnssd
_______________________________________________ homenet mailing list [email protected] https://www.ietf.org/mailman/listinfo/homenet
