>Just forward the packet.
>If there is a mis-config, and a routing loop happens, the packet will
>ping pong till the hop count expires, then be trashed. Other than
>deliberate DoS attacks, there shouldn't be many of these. Where there's
oops, I was not clear enough.
I'm asking this because there are a lot of these, because of some
applications that specifies wrong outgoing interface for linklocal
address. once we have a neighbor cache entry for nonexisting peer,
NUD packets will be emitted repeatedly (NUD is mandatory for p2p too)
and chew traffic. DoS attack is also our concern.
itojun
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page: http://playground.sun.com/ipng
FTP archive: ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------