Richard Barnes <[email protected]> wrote Mon, 6 Jan 2014 22:01:03 -0500: | I also wonder to what degree this is a "pervasive attack" issue. If the | attack involves being physically close to the victim, it's hard to see how | the attacker would achieve a pervasive scale.
An attacker could control a large number of "home routers". Do we need stronger indications that's actually being done at a large scale before we consider strengthening L2 protocols and best practices? If so, what is "large scale" and "pervasive"? _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
