>       Its harder w/ v4 than v6.  v6, its dirt simple.
>       turn on routing for your DNS server. It advertizes
>       its self and the well-known address to the local segment.
>       Odds are that the well-known prefix is "nearer" from
>       this new router than from the "offical" egress point.
>       Other nodes, listening to RA/ND see this new router 
>       and the well-known prefix. can you say hijack? 

        the issues with anycast address is documented in
        draft-ietf-ipngwg-ipv6-anycast-analysis-00.txt (pending IESG review),
        so we don't need to repeat it here.

        i can buy the argument with router advertisement, however, i cannot
        for routing advertisements.  if you don't protect routing
        infrastructure, it's your fault.  routing protocols must be secured
        or you are in trouble.

        btw - both RIPng and OSPFv3 relies upon IPsec over multicast and
        do not define its own security mechanism.  i wonder how many
        implementation can do this.  IPsec over multicast is, i would say,
        hard (not to mention automatic key exchange).

itojun
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to