Can we please not get into a debate about how well BCP38 is or is not deployed, whether violations are remotely detectable, ...This is NOT the working group for that.

For our purposes, given that source address forging is known to occur, we have to allow it in the threat analysis.

Yours,
Joel

On 5/27/14, 11:04 AM, Dino Farinacci wrote:

Also, recall that large BCP38 holes exist in today's internet.

And I am going to repeat again, this is not a binary statement. That is, if a 
BCP38 hole exists in one part of the network, source spoofing can still be 
detected in other parts of the network.

Dino



_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to