[LAC-TF] Revision del IETF I-D "Security and Interoperability Implications of Oversized IPv6 Header Chains"
Fernando Gont
fgont at si6networks.com
Wed Jun 13 04:55:48 BRT 2012
FYI
<http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt>
(Thnx Ron, Ran, y Roque por los comentarios)
Saludos, y gracias!
Fernando
-------- Original Message --------
Subject: New Version Notification for
draft-gont-6man-oversized-header-chain-02.txt
Date: Wed, 13 Jun 2012 00:44:53 -0700
From: internet-drafts at ietf.org
To: fgont at si6networks.com
CC: vishwas.manral at hp.com
A new version of I-D, draft-gont-6man-oversized-header-chain-02.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.
Filename: draft-gont-6man-oversized-header-chain
Revision: 02
Title: Security and Interoperability Implications of Oversized IPv6
Header Chains
Creation date: 2012-06-13
WG ID: Individual Submission
Number of pages: 12
URL:
http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt
Status:
http://datatracker.ietf.org/doc/draft-gont-6man-oversized-header-chain
Htmlized: http://tools.ietf.org/html/submission.filename }}-02
Diff:
http://tools.ietf.org/rfcdiff?url2=draft-gont-6man-oversized-header-chain-02
Abstract:
The IPv6 specification allows IPv6 header chains of an arbitrary
size. The specification also allows options which can in turn extend
each of the headers. In those scenarios in which the IPv6 header
chain or options are unusually long and packets are fragmented, or
scenarios in which the fragment size is very small, the first
fragment of a packet may fail to include the entire IPv6 header
chain. This document discusses the interoperability and security
problems of such traffic, and updates RFC 2460 such that the first
fragment of a packet is required to contain the entire IPv6 header
chain.
The IETF Secretariat
More information about the LACTF
mailing list