Hi,
----- Original Message ----- > First, what if the ETR does not observe the MAY, and > simply lets anonymous nodes pretend to be ITRs that > send inner packets with spoofed EID source addresses? You have a worst attack: what happens to an ETR that uses the RLOC status bits and someone forge data packets from another ITR toward this ETR and plays with those bits? Best, Rani _______________________________________________ lisp mailing list [email protected] https://www.ietf.org/mailman/listinfo/lisp
