Hi,

----- Original Message -----
> First, what if the ETR does not observe the MAY, and
> simply lets anonymous nodes pretend to be ITRs that
> send inner packets with spoofed EID source addresses?

You have a worst attack: what happens to an ETR that uses
the RLOC status bits and someone forge data packets from another
ITR toward this ETR and plays with those bits?



Best,
Rani
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to