> > Sorry, let me clarify my thought. Even if the initiator is a forgery (i.e., > it > > impersonates other host), how could the responder distinguish whether it is > a > > forgery or not? > > > A priori, he cannot, just as is the situation today.
As such, some mechanisms described in Section 12.2 "Forged Identifier Attacks" of draft-rja-ilnp-intro-03 seem problematic. Correct? Best wishes, Xiaohu _______________________________________________ rrg mailing list [email protected] http://www.irtf.org/mailman/listinfo/rrg
