Threats Relating to Transport Layer Protocols Handling Multiple Addresses
draft-ohta-multi6-threats-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Dr. Masataka Ohta | ||
Last updated | 2004-02-04 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document lists security threats related to IPv6 multihoming solutions, transport layer protocols of which are expected to handle multiple addresses of a host and an identity of the host is recognized not necessarily by a single address. The intent is to look at how IPv6 multihoming solutions might make the Internet less secure than the current Internet, without studying any proposed solution but instead looking at threats that are inherent in the problem itself.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)