Keith Moore wrote:
> > Note that the MitM can also change the IP address, but if he does
> > so, he is *not* attacking the original host, as the address is
> > changed.
>
> unless of course the MitM can convince that host to take on that address
> as an alias.
So Mallory says that his address M is an alias for Alice's address A. Ok.
What if Bob looking at A could know (yes, signalled by a bit) that A
it is only aliasable by very secure mechanisms. That's the whole point.
Mallory would then be forced to break any of several very strong
(using crypto and explicit trust relationships) mechanisms:
- AAA
- PKI
- CGA
- etc
RR would definitely not be included here.
-gabriel
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page: http://playground.sun.com/ipng
FTP archive: ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------