CGA’s (2)
More expensive than RR, but is it an issue?
- RR may do DH anyway (but no signatures, yes)
- Red herring? Small devices may have hardware assist (SIM cards, etc)
Vulnerabilities
- Anybody can invent an address and use it to launch DoS, reflector, etc
- The protocol itself needs to explicitly protect against DoS