Security Threats for Simplified Multicast Forwarding (SMF)
draft-ietf-manet-smf-sec-threats-01

The information below is for an old version of the document
Document Type Expired Internet-Draft (manet WG)
Authors Jiazi Yi  , Thomas Clausen  , Ulrich Herberg 
Last updated 2015-03-23 (latest revision 2014-09-14)
Replaces draft-yi-manet-smf-sec-threats
Stream Internet Engineering Task Force (IETF)
Formats
Expired & archived
pdf htmlized bibtex
Reviews
Additional Resources
- Mailing list discussion
Stream WG state WG Consensus: Waiting for Write-Up
Document shepherd Christopher Dearlove
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to "Christopher Dearlove" <chris.dearlove@baesystems.com>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-manet-smf-sec-threats-01.txt

Abstract

This document analyzes security threats of the Simplified Multicast Forwarding (SMF), including the vulnerabilities of duplicate packet detection and relay set selection mechanisms. This document is not intended to propose solutions to the threats described.

Authors

Jiazi Yi (jiazi@jiaziyi.com)
Thomas Clausen (T.Clausen@computer.org)
Ulrich Herberg (ulrich@herberg.name)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)