Trust Models and Security in Multicast Listener Discovery
draft-daley-magma-smld-prob-00

Document Type Expired Internet-Draft (individual)
Last updated 2004-07-12
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-daley-magma-smld-prob-00.txt

Abstract

The Multicast Listener Discovery (MLD) is used by IPv6 routers to discover the presence of multicast listeners (i.e. nodes that wish to receive multicast packets) on their directly attached links, and to discover which multicast addresses are of interest to those neighbouring nodes. The existing protocol specification (MLDv2) discusses the effects of on-link forgery of MLD packets but provides no protection from on-link attacks. By taking advantage of or abusing Multicast Listener Discovery, bogus devices may cause incorrect state and disruption to multicast or unicast packet delivery. This memo considers the trust models for the MLD protocols, and their interaction as well as their interaction with link-layer and multicast proxy devices. It provides a security and threat analysis for each model.

Authors

Greg Daley (gdaley@netstarnetworks.com)
Gopi Kurup (gopakumar.kurup@eng.monash.edu.au)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)