[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IVs, summary of discussion



Phil,

	An attacker might still engage in modification attacks,
depending on the response of the protocols (IPSP and higher layer
protocols), to such attacks.  In the ideal case, the protocols respond
in a fashion that requires the attacker to continue the attack in
order to effect denial of service.  In that way, one can use fault
isolation techniques to track down the attacks.  However, protocols
that "give up" too easily or that are unstable in terms of
retransmission behavior may still be attractive targets for denial
of service purposes.

Steve


References: