On Wed, 2003-01-29 at 20:19, Brian Haberman wrote:
> > However, you could flood the anycast server with RR state simply by
> > sending a lot of SYN packets with different forged source addresses.
> 
> Doesn't MIPv6 have the same problem with flooding an MN with bogus
> data as a DoS attack?  Casting aside any issues with a binding cache,
> where is the difference between the anycast server and a mobile node?
> 
> Won't flooding with SYN packets have the same affect on a mobile node?

Well, yes, but the idea is to protect the servers DoS attacks. Flooding
an MN only affects a single user, typically.

        MikaL

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to