[LAC-TF] Fwd: New Version Notification for draft-gont-6man-oversized-header-chain-00.txt
Fernando Gont
fgont at si6networks.com
Fri Feb 17 10:49:54 BRST 2012
Estimados,
Hemos publicado un nuevo IETF I-D sobre "Security and Interoperability
Implications of Oversized IPv6 Header Chains".
El mismo se encuentra disponible en:
<http://tools.ietf.org/id/draft-gont-6man-oversized-header-chain-00.txt>
Cualquier comentario será mas que bienvenido.
Saludos cordiales,
Fernando
-------- Original Message --------
Subject: New Version Notification for
draft-gont-6man-oversized-header-chain-00.txt
Date: Thu, 16 Feb 2012 16:30:46 -0800
From: internet-drafts at ietf.org
To: vishwas.manral at hp.com
CC: vishwas.manral at hp.com, fgont at si6networks.com
A new version of I-D, draft-gont-6man-oversized-header-chain-00.txt has
been successfully submitted by Vishwas Manral and posted to the IETF
repository.
Filename: draft-gont-6man-oversized-header-chain
Revision: 00
Title: Security and Interoperability Implications of Oversized IPv6
Header Chains
Creation date: 2012-02-17
WG ID: Individual Submission
Number of pages: 13
Abstract:
The IPv6 specification allows IPv6 header chains of an arbitrary
size. The specification also allows options which can in turn extend
each of the headers. In those scenarios in which the IPv6 header
chain or options are unusually long and packets are fragmented, or
scenarios in which the fragment size is very small, the first
fragment of a packet may fail to include the entire IPv6 header
chain. This document discusses the interoperability and security
problems of such traffic, and updates RFC 2460 such that all IPv6
packets are required to contain the entire IPv6 header chain within
the 'minimum IPv6 MTU' (1280) bytes of the packet.
The IETF Secretariat
More information about the LACTF
mailing list