
|
Security considerations Constraints: No per flow states within the domain, no reverse routing state Threats: Injecting signaling messages by off-path, on-path non-NSIS nodes Injecting messages by on-path NSIS nodes Remarking of packets to indicate severe congestion Possible security solutions: Protection of edge-to-edge messages to limit signaling protocol interaction with nodes within the domain Consistency checks: identify and check fields that cannot be changed, RII, PDR NONCE, consistency between intra-domain and inter-domain messages Intrusion detection to deal with malicious node (packet data marking) |