Nowadays, since people are always keen to look for so called "cheap, fast, 
...," wifi access points in public places like restaurant, it is reported that 
some forged access points appear to attract people to access Internet network 
through them where the private information like credit card number and password 
may be collected by those bad access points, which may be an issue needing 
consideration when deploying mDNS.
 


Guangqing Deng
CNNIC 
 
From: Henning Rogge
Date: 2014-04-11 14:41
To: Douglas Otis
CC: dnssd; HOMENET; Don Sturek; Dave Taht
Subject: Re: [dnssd] [homenet] IETF-89 WG meeting minutes
On Fri, Apr 11, 2014 at 1:53 AM, Douglas Otis <[email protected]> wrote:
> mDNS is not easily deployed at large scale over wireless without filtering.  
> Wifi has improved by offering mitigation strategies like multicast queuing 
> per N beacons and multicast specific filters.  Even so, these strategies are 
> unlikely needed at home.  I make extensive use of mDNS within a dense 
> wireless spectrum containing dozens of nearby access points without 
> difficulty while transferring multiple HD+ streams.  I would be interested in 
> knowing what problems you are experiencing within your home.
 
Its not only mDNS, its also ARP, ICMPv6 and other "linklocal
multicast" protocols that work badly over large Wifi linklayer
domains. Linklocal normally means "fast, cheap, atomic, in-order"...
if you replace it with a large wireless layer-2 domain, it becomes
something very different.
 
Henning Rogge
 
_______________________________________________
dnssd mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnssd
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to