Security Threats for Simplified Multicast Forwarding (SMF)
draft-yi-manet-smf-sec-threats-00
Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Jiazi Yi , Thomas H. Clausen , Ulrich Herberg | ||
Last updated | 2014-07-04 | ||
Replaced by | draft-ietf-manet-smf-sec-threats | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Replaced by draft-ietf-manet-smf-sec-threats | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document analyzes security threats of the Simplified Multicast Forwarding (SMF), including the vulnerabilities of duplicate packet detection and relay set selection mechanisms. This document is not intended to propose solutions to the threats described.
Authors
Jiazi Yi
Thomas H. Clausen
Ulrich Herberg
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)