Hi Xiaohu,

> If so, wouldn¹t it be used as a way for flooding-attack? For example, one
> or more malicious host could assume an identifier of a target server and
> initiate sessions to a huge mount of hosts, and these hosts will in turn
> return their response packets to the target server. If the returning traffic
> is large, wouldn¹t the target server be flooded?

Seems like there's no amplification, so I don't see how its any different
than a straightforward ping flood.  Same situation as today.
 
> By the way, how could you conclude the connection is a forgery, rather than
> a new legitimate one?

Unless I've lost the context of the thread (a distinct possibility), you
stipulated that it was a forgery.

Regards,
Tony


_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to