[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: flooding attacks and threats doc (was Re: Comments on draft-bagnulo-multi6dt-hba-00.txt



marcelo bagnulo braun wrote:
This flooding attack is slightly different from the one mentioned in the
threats document because there is no real victim invovled. Just the
routers and links which still needs to be prevented.


perhaps it would make sense to mention explicitly in the threats document that the target of a flooding attack may not be a host but an access link or an access router?

What do others think? I'll send in an updated threats document later this week (just waiting for an answer from Rob Austein) so if folks want a clarification about this let me know soon.
(And text to include would be appreciated as always.)


  Erik