rpsec-3----Page:4
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

Draft’s Outline
Vulnerabilities due to the design and nature of OSPF
Attacker’s Location
Disabling of OSPF Fight Back
Leveraging Fight Back as intrinsic source for DoS
External Routes propagation
Vulnerabilities for each of the 5 OSPF messages:
Hello
Link State Update
Link State Request
Link State Acknowledge
Link State Database Description
Vulnerabilities due to Resource Consumption
Vulnerabilities due to Cryptographic Resources
Vulnerabilities through other protocols (e.g. IP, Management…)
PPT Version