Hi, On Sep 14, 2011, at 22:39 , Rani Assaf wrote:
> Hi, > > > ----- Original Message ----- >> First, what if the ETR does not observe the MAY, and >> simply lets anonymous nodes pretend to be ITRs that >> send inner packets with spoofed EID source addresses? > > You have a worst attack: what happens to an ETR that uses > the RLOC status bits and someone forge data packets from another > ITR toward this ETR and plays with those bits? > Both the LISP main document and the lisp-threats document already pointed out this. They state that a change in the Loc-Status-Bit should be confirmed with a Map-Request/Map-Reply exchange. Luigi > > > Best, > Rani > _______________________________________________ > lisp mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/lisp _______________________________________________ lisp mailing list [email protected] https://www.ietf.org/mailman/listinfo/lisp
