Last-hop Threats to Protocol Independent Multicast (PIM)
draft-savola-pim-lasthop-threats-02

Document Type Replaced Internet-Draft (individual)
Last updated 2008-04-16 (latest revision 2006-06-15)
Replaced by draft-ietf-pim-lasthop-threats
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-pim-lasthop-threats
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-savola-pim-lasthop-threats-02.txt

Abstract

An analysis of security threats has been done for some parts of the multicast infrastructure, but the threats specific to the last-hop ("Local Area Network") attacks by hosts on the PIM routing protocol have not been well described in the past. This memo aims to fill that gap.

Authors

James Lingard (james@lingard.com)
Pekka Savola (psavola@csc.fi)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)