Last-hop Threats to Protocol Independent Multicast (PIM)

Document Type Replaced Internet-Draft (individual)
Last updated 2008-04-16 (latest revision 2006-06-15)
Replaced by draft-ietf-pim-lasthop-threats
Stream (None)
Intended RFC status (None)
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-pim-lasthop-threats
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


An analysis of security threats has been done for some parts of the multicast infrastructure, but the threats specific to the last-hop ("Local Area Network") attacks by hosts on the PIM routing protocol have not been well described in the past. This memo aims to fill that gap.


James Lingard (
Pekka Savola (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)