[LAC-TF] Revision del IETF I-D "Security and Interoperability Implications of Oversized IPv6 Header Chains"

Fernando Gont fgont at si6networks.com
Wed Jun 13 04:55:48 BRT 2012


FYI

<http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt>

(Thnx Ron, Ran, y Roque por los comentarios)

Saludos, y gracias!
Fernando




-------- Original Message --------
Subject: New Version Notification for
draft-gont-6man-oversized-header-chain-02.txt
Date: Wed, 13 Jun 2012 00:44:53 -0700
From: internet-drafts at ietf.org
To: fgont at si6networks.com
CC: vishwas.manral at hp.com


A new version of I-D, draft-gont-6man-oversized-header-chain-02.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Filename:	 draft-gont-6man-oversized-header-chain
Revision:	 02
Title:		 Security and Interoperability Implications of Oversized IPv6
Header Chains
Creation date:	 2012-06-13
WG ID:		 Individual Submission
Number of pages: 12
URL:
http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt
Status:
http://datatracker.ietf.org/doc/draft-gont-6man-oversized-header-chain
Htmlized:        http://tools.ietf.org/html/submission.filename }}-02
Diff:
http://tools.ietf.org/rfcdiff?url2=draft-gont-6man-oversized-header-chain-02

Abstract:
   The IPv6 specification allows IPv6 header chains of an arbitrary
   size.  The specification also allows options which can in turn extend
   each of the headers.  In those scenarios in which the IPv6 header
   chain or options are unusually long and packets are fragmented, or
   scenarios in which the fragment size is very small, the first
   fragment of a packet may fail to include the entire IPv6 header
   chain.  This document discusses the interoperability and security
   problems of such traffic, and updates RFC 2460 such that the first
   fragment of a packet is required to contain the entire IPv6 header
   chain.





The IETF Secretariat




More information about the LACTF mailing list