[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: additional attack for multi6 threat draft?



marcelo;

but in other cases, you may not even need to be a MiTM
For instance if you don't do any type of verification of the identity.

An invalid example.


On the Internet, RR based verification is MUST,


Why?

Why?


Can you name some protocol that does not do this?

If you can't, guess "why?".

Masataka Ohta