Threat Analysis for IPv6 Public Multi-Access Links
draft-kempf-ipng-netaccess-threats-02

Document Type Expired Internet-Draft (individual)
Authors James Kempf  , Erik Nordmark 
Last updated 2002-06-28
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-kempf-ipng-netaccess-threats-02.txt

Abstract

The Mobile IP Working Group has been conducting a threat analysis for the purpose of securing specific Mobile IPv6 mechanisms. In the process of conducting the analysis, threats were identified that are not specific to Mobile IP but that are amplified by the nature of mobility. These threats are likely to be more or less of an issue within any Public Multi-Access network, regardless of whether mobility is involved. This document discusses threats associated with Public Multi-Access links in IPv6. The document covers non- Mobile IP specific threats uncovered by the Mobile IPv6 study, threats raised in the IPv6 Neighbor Discovery and Stateless Address Autoconfiguration RFCs that have yet to be adequately addressed, and new threats that have not previously been identified.

Authors

James Kempf (kempf@docomolabs-usa.com)
Erik Nordmark (nordmark@acm.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)