Hi,

On Sep 14, 2011, at 22:39 , Rani Assaf wrote:

> Hi,
> 
> 
> ----- Original Message -----
>> First, what if the ETR does not observe the MAY, and
>> simply lets anonymous nodes pretend to be ITRs that
>> send inner packets with spoofed EID source addresses?
> 
> You have a worst attack: what happens to an ETR that uses
> the RLOC status bits and someone forge data packets from another
> ITR toward this ETR and plays with those bits?
> 

Both the LISP main document and the lisp-threats document already pointed out 
this. They state that a change in the Loc-Status-Bit should be confirmed with a 
Map-Request/Map-Reply exchange.

Luigi


> 
> 
> Best,
> Rani
> _______________________________________________
> lisp mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/lisp

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to