On 30/09/2010 05:51 a.m., Mark Townsley wrote: > "[4] ISATAP and 6rd may require a list of router addresses and/or > per-neighbor state to avoid tunnel looping attacks." > > The list of BR addresses for the CE as well as the BR ACL config to > counteract the looping attack are static configuration items, neither > constitute dynamic state.
Besides that, one might argue that the deployment scenarios on which these routing loops attacks can be successfully performed are somewhat questionable. -- Please see the comments that I posted about the tunnel-loops I-D on the v6ops mailing-list. Thanks! Kind regards, -- Fernando Gont e-mail: [email protected] || [email protected] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 _______________________________________________ Softwires mailing list [email protected] https://www.ietf.org/mailman/listinfo/softwires
