In your letter dated Tue, 12 Jul 2011 18:32:15 -0400 you wrote:
>
>       IMHO I think this would be a vector for other attacks in ND.
>
>       You may solve a remote attack but you are opening the door to =
>local attacks, and a big ones I think.

Let's assume for a moment a 'normal' link (not one with 6000 hosts) and a
protocol that spreads NS requests by the hosts over a period of say 20 seconds,
how would you then use this as an attack vector?


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to