base.txt   issue96.txt 
skipping to change at page 47, line 33 skipping to change at page 47, line 33
o The Neighbor Cache, Prefix List and Default Router list entries o The Neighbor Cache, Prefix List and Default Router list entries
MUST have a secured/unsecured flag that indicates whether the MUST have a secured/unsecured flag that indicates whether the
message that caused the creation or last update of the entry was message that caused the creation or last update of the entry was
secured or unsecured. Received unsecured messages MUST NOT cause secured or unsecured. Received unsecured messages MUST NOT cause
changes to existing secured entries in the Neighbor Cache, Prefix changes to existing secured entries in the Neighbor Cache, Prefix
List or Default Router List. The Neighbor Cache SHOULD implement a List or Default Router List. The Neighbor Cache SHOULD implement a
flag on entries indicating whether the entry is secured. Received flag on entries indicating whether the entry is secured. Received
secured messages MUST cause an update of the matching entries and secured messages MUST cause an update of the matching entries and
flagging of them as secured. flagging of them as secured.
o Neighbor Solicitations for the purpose of Neighbor Unreachabilty
Detection (NUD) MUST be sent to that neighbor's solicited-nodes
multicast address, if the entry is not secured with SEND.
Upper layer confirmations on unsecured neighbor cache entries
SHOULD NOT update neighbor cache state from STALE to REACHABLE on
a SEND node, if the neighbour cache entry has never previously
been REACHABLE. This ensures that if an entry spoofing a valid
SEND host is created by a non-SEND attacker without being
solicited, NUD will be done within 5 seconds of use of the entry
for data transmission.
As a result, in mixed mode attackers can take over a Neighbor
Cache entry of a SEND node for a longer time only if (a) the SEND
node was not communicating with the victim node so that there is
no secure entry for it and (b) the SEND node is not currently on
the link (or is unable to respond).
o The conceptual sending algorithm is modified so that an unsecured o The conceptual sending algorithm is modified so that an unsecured
router is selected only if there is no reachable SEND router for router is selected only if there is no reachable SEND router for
the prefix. That is, the algorithm for selecting a default router the prefix. That is, the algorithm for selecting a default router
favors reachable SEND routers over reachable non-SEND ones. favors reachable SEND routers over reachable non-SEND ones.
o A node MAY adopt a router sending unsecured messages, or a router o A node MAY adopt a router sending unsecured messages, or a router
for which secured messages have been received, but for which full for which secured messages have been received, but for which full
security checks have not yet been completed, while security security checks have not yet been completed, while security
checking is underway. Security checks in this case include checking is underway. Security checks in this case include
certification path solicitation, certificate verification, CRL certification path solicitation, certificate verification, CRL
 End of changes. 

This html diff was produced by rfcdiff v1.06, available from http://www.levkowetz.com/ietf/tools/rfcdiff/