[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: flooding attacks and threats doc (was Re: Comments on draft-bagnulo-multi6dt-hba-00.txt
marcelo bagnulo braun wrote:
This flooding attack is slightly different from the one mentioned in the
threats document because there is no real victim invovled. Just the
routers and links which still needs to be prevented.
perhaps it would make sense to mention explicitly in the threats
document that the target of a flooding attack may not be a host but an
access link or an access router?
I agree that the target can be not just a host but also a link,
router, or a network. If the threats document claims otherwise
then it needs to be corrected.
Of course there are some differences in the
threat to a host and to a network, but if you move
someone's DVD download on my GPRS link, I'm hosed whether or
not the target address is my host's address.
--Jari