Hi,

If you've access to someone's machine and can twiddle parameters
of their IP stack, then RH0 isn't a big deal.

I did not understand your point here.
Are you trying to justify that RH0 are harmless regarding other kind of attacks ?

Guillaume

--
Guillaume Valadon / ギョーム バラドン
[EMAIL PROTECTED]




--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to