> I have a different question in the same context. Assume two nodes
> node A and node B on the same link. If node A (malicious) does
> not do *DAD* and sends out a packet with node B's address as source
> address to B, B should drop the packet. But this is not mentioned
> in the spec anywhere. It assumes that both nodes A and B does
> DAD. If node B does not drop the packet, it could potentially
> create a neighbor cache entry with node A's source address
> which is itself, with node A's h/w address information.
> 
> Does the spec say anything on the above ?

No.

I don't see why you would create a neighbor cache entry in this situation.
When node B tries to reply to the source address in the packet, which is its
own address, won't node B just use its loopback path and not create an NCE?

ND does not claim to be secure against malicious nodes on your link.

Rich
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to