In your letter dated Tue, 12 Jul 2011 18:32:15 -0400 you wrote: > > IMHO I think this would be a vector for other attacks in ND. > > You may solve a remote attack but you are opening the door to = >local attacks, and a big ones I think.
Let's assume for a moment a 'normal' link (not one with 6000 hosts) and a protocol that spreads NS requests by the hosts over a period of say 20 seconds, how would you then use this as an attack vector? -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
