On 30/09/2010 05:51 a.m., Mark Townsley wrote:

> "[4] ISATAP and 6rd may require a list of router addresses and/or
> per-neighbor state to avoid tunnel looping attacks."
> 
> The list of BR addresses for the CE as well as the BR ACL config to
> counteract the looping attack are static configuration items, neither
> constitute dynamic state.

Besides that, one might argue that the deployment scenarios on which
these routing loops attacks can be successfully performed are somewhat
questionable. -- Please see the comments that I posted about the
tunnel-loops I-D on the v6ops mailing-list.

Thanks!

Kind regards,
-- 
Fernando Gont
e-mail: [email protected] || [email protected]
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to