> > Sorry, let me clarify my thought. Even if the initiator is a forgery
(i.e.,
> it
> > impersonates other host), how could the responder distinguish whether it
is
> a
> > forgery or not?
> 
> 
> A priori, he cannot, just as is the situation today.

As such, some mechanisms described in Section 12.2 "Forged Identifier
Attacks" of draft-rja-ilnp-intro-03 seem problematic. Correct?

Best wishes,
Xiaohu

_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to