Threat Analysis for IPv6 Public Multi-Access Links
draft-kempf-ipng-netaccess-threats-02
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | James Kempf , Erik Nordmark | ||
Last updated | 2002-06-28 | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-kempf-ipng-netaccess-threats-02.txt
Abstract
The Mobile IP Working Group has been conducting a threat analysis for the purpose of securing specific Mobile IPv6 mechanisms. In the process of conducting the analysis, threats were identified that are not specific to Mobile IP but that are amplified by the nature of mobility. These threats are likely to be more or less of an issue within any Public Multi-Access network, regardless of whether mobility is involved. This document discusses threats associated with Public Multi-Access links in IPv6. The document covers non- Mobile IP specific threats uncovered by the Mobile IPv6 study, threats raised in the IPv6 Neighbor Discovery and Stateless Address Autoconfiguration RFCs that have yet to be adequately addressed, and new threats that have not previously been identified.
Authors
James Kempf
(kempf@docomolabs-usa.com)
Erik Nordmark
(nordmark@acm.org)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)