Hi Xiaohu, > If so, wouldn¹t it be used as a way for flooding-attack? For example, one > or more malicious host could assume an identifier of a target server and > initiate sessions to a huge mount of hosts, and these hosts will in turn > return their response packets to the target server. If the returning traffic > is large, wouldn¹t the target server be flooded?
Seems like there's no amplification, so I don't see how its any different than a straightforward ping flood. Same situation as today. > By the way, how could you conclude the connection is a forgery, rather than > a new legitimate one? Unless I've lost the context of the thread (a distinct possibility), you stipulated that it was a forgery. Regards, Tony _______________________________________________ rrg mailing list [email protected] http://www.irtf.org/mailman/listinfo/rrg
