Skip to main content

Last-hop Threats to Protocol Independent Multicast (PIM)
draft-savola-pim-lasthop-threats-02

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors James Lingard , Pekka Savola
Last updated 2008-04-16 (Latest revision 2006-06-15)
Replaced by draft-ietf-pim-lasthop-threats
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-pim-lasthop-threats
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

An analysis of security threats has been done for some parts of the multicast infrastructure, but the threats specific to the last-hop ("Local Area Network") attacks by hosts on the PIM routing protocol have not been well described in the past. This memo aims to fill that gap.

Authors

James Lingard
Pekka Savola

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)