[LAC-TF] Fwd: New Version Notification for draft-gont-6man-oversized-header-chain-00.txt

Fernando Gont fgont at si6networks.com
Fri Feb 17 10:49:54 BRST 2012


Estimados,

Hemos publicado un nuevo IETF I-D sobre "Security and Interoperability
Implications of Oversized IPv6 Header Chains".

El mismo se encuentra disponible en:
<http://tools.ietf.org/id/draft-gont-6man-oversized-header-chain-00.txt>

Cualquier comentario será mas que bienvenido.

Saludos cordiales,
Fernando




-------- Original Message --------
Subject: New Version Notification for
draft-gont-6man-oversized-header-chain-00.txt
Date: Thu, 16 Feb 2012 16:30:46 -0800
From: internet-drafts at ietf.org
To: vishwas.manral at hp.com
CC: vishwas.manral at hp.com, fgont at si6networks.com

A new version of I-D, draft-gont-6man-oversized-header-chain-00.txt has
been successfully submitted by Vishwas Manral and posted to the IETF
repository.

Filename:	 draft-gont-6man-oversized-header-chain
Revision:	 00
Title:		 Security and Interoperability Implications of Oversized IPv6
Header Chains
Creation date:	 2012-02-17
WG ID:		 Individual Submission
Number of pages: 13

Abstract:
   The IPv6 specification allows IPv6 header chains of an arbitrary
   size.  The specification also allows options which can in turn extend
   each of the headers.  In those scenarios in which the IPv6 header
   chain or options are unusually long and packets are fragmented, or
   scenarios in which the fragment size is very small, the first
   fragment of a packet may fail to include the entire IPv6 header
   chain.  This document discusses the interoperability and security
   problems of such traffic, and updates RFC 2460 such that all IPv6
   packets are required to contain the entire IPv6 header chain within
   the 'minimum IPv6 MTU' (1280) bytes of the packet.





The IETF Secretariat




More information about the LACTF mailing list