Kevin C. Almeroth wrote: >>>It only requires being on a non-IGMP'd switch or a hub; at that point, >>>you can snoop the traffic and see any packet going to any multicast group. >>> >>>It's much harder to snoop UDP; for non-broadcast, you'd have to be >>>in-line (on the wire, effectively) or on a hub. While hubs are becoming >>>less common, they're often being replaced with cheaper non-IGMP-capable >>>switches. Which means that they're still hubs, as far as multicast >>>traffic is concerned. >> > > Without a dobut you are right, though I think the degree of difference is > awful small. Through hosts with root on switches or through wireless into > the mix and you are back to being roughly equivalent. Hosts with root can't snoop anything but broadcast UDP on switches unless the switch is configurable; many switches aren't. > However, for any reasonable content provider the difference shouldn't > matter. If you have sensitive/valuable content, whether it is unicast > or multicast, it should be protected. To say that multicast isn't being > used because there isn't security is a non-sequitor. There certainly may be more immediate concerns (scalability, accounting, etc.), but that doesn't mean security isn't a concern. > Better yet, try RFC3171. Bottom-line: there are weak links in the chain. > But, if those weak links weren't there, other links would be weak links, > and THOSE weak links would still be weak enough to require using encryption. > It just so happens that the weak multicast links are only a bit weaker than > the unicast links. Understand that convoluted logic? :-) Not quite; as Valdis observes. Multicast is necessarily a LOT weaker: 1) I can get a copy of packets by normal operation (join a group). there is no equivalent for UDP, notably for paths that aren't shared. 2) UDP has application, network, and tunnel encryption that is both widely deployed and widely used. there is no equivalent for multicast. Joe