midcom-4 Page:10
1  2  3  4  5  6  7  8  9  10  11  12 

The Good News
Scope of Nasty Problem is not so bad
A must be on path from S to T
T must be in scope of any address filtering from C to S
Including NATs
Result: snooping access LAN, can only DoS someone on the LAN
Spec defines some heuristics for client to detect this case
Duplicate responses
Inconsistent responses
They are just heuristics
Spec recommends security in app protocol
SRTP for example