>Just forward the packet.
>If there is a mis-config, and a routing loop happens, the packet will
>ping pong till the hop count expires, then be trashed.   Other than
>deliberate DoS attacks, there shouldn't be many of these.  Where there's

        oops, I was not clear enough.
        I'm asking this because there are a lot of these, because of some
        applications that specifies wrong outgoing interface for linklocal
        address.  once we have a neighbor cache entry for nonexisting peer,
        NUD packets will be emitted repeatedly (NUD is mandatory for p2p too)
        and chew traffic.  DoS attack is also our concern.

itojun
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to