Dave, you are right (of course :)).

Dave Thaler wrote:
> 
> Dirk Ooms writes:
> [...]
> > > All currently deployed (that I know of) multicast routing protocols
> > > employ RPF checks in some form.  Roughly, this means that A
> > > has to be either on the same subnet as V (in which case all
> > > receivers will respond), or else somewhere on the multicast
> > > distribution tree used by V (in which case only those
> > > receivers down the subtree past that point will respond).
> > > If A is not on the distribution tree, then the attack
> > > generally won't work.  There are a few exceptions, though,
> > > such as sending the Packet Too Big in a register message
> > > to the victim's RP in PIMSM.  If V is not actually sourcing traffic
> > > to the group, and receivers are in V's domain, then a large
> > > volume could be continuously generated.  (If V is sourcing
> >
> > Unless the RP immediately switches to the source tree when it receives
> > the first 'Packet Too Big' packet (which is a typical
> > configuration). In
> > this case there will only be a burst towards V.  Correct?
> 
> No.  If V is not sourcing traffic, the SPT bit will never get
> set on the RP's state and it will continue accepting registers
> even though an (S,G) branch has been created.
> As a result, every register will continue to be forwarded
> down the (*,G) tree to all the receivers.
> 
> -Dave
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to