[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: flooding attacks and threats doc (was Re: Comments on draft-bagnulo-multi6dt-hba-00.txt




Since nobody suggested text, I've added the second paragraph below in section 4.3:
<existing paragraph>
An attacker can use the ability to perform redirection to cause
overload on an unrelated third party. For instance, if A and B
are communicating then the attacker X might be able to convince A to
send the packets intended for B to some third node C.
While this might seem harmless at first, since X could just flood C with
packets directly, there are a few aspects of these attacks that cause
concern.


<added paragraph>
Such an attack might be against the resources of a particular host i.e., C
in the example above, or it might be against the network infrastructure
towards a particular IP address prefix, by overloading the routers or links
even though there is no host at the address being targeted.

  Erik