On 2009-12-02 10:02, Noel Chiappa wrote:
...
> But if addresses can be added later, then the mechanism for doing so has to
> be secured. (Although there are a number of ways to do that; but if there's
> a MITM attacker 'simple' things like depending on sequence numbers might not
> work.)
Exactly. A lot of the complexity in shim6 comes from this requirement, and
serves as a proof of concept.
Brian
_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg