Draft’s Outline Vulnerabilities due to the design and nature of OSPF Attacker’s Location Disabling of OSPF Fight Back Leveraging Fight Back as intrinsic source for DoS External Routes propagation Vulnerabilities for each of the 5 OSPF messages: Hello Link State Update Link State Request Link State Acknowledge Link State Database Description Vulnerabilities due to Resource Consumption Vulnerabilities due to Cryptographic Resources Vulnerabilities through other protocols (e.g. IP, Management…) |