Randy Bush wrote:
this glibly glosses over that, by outsourcing origin validation, an
attack vector is introduced.  i presume i do not need to describe it.
so it needs to be big in the sec cons.

Is it bigger than the attack vector allowed for when not doing origin validation at all?

Kind regards,
Aris Lambrianidis

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to