[LACNIC/Seguridad] Revision del IETF I-D "Security and Interoperability Implications of Oversized IPv6 Header Chains"
Fernando Gont
fgont en si6networks.com
Mie Jun 13 04:55:48 BRT 2012
FYI
<http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt>
(Thnx Ron, Ran, y Roque por los comentarios)
Saludos, y gracias!
Fernando
-------- Original Message --------
Subject: New Version Notification for
draft-gont-6man-oversized-header-chain-02.txt
Date: Wed, 13 Jun 2012 00:44:53 -0700
From: internet-drafts en ietf.org
To: fgont en si6networks.com
CC: vishwas.manral en hp.com
A new version of I-D, draft-gont-6man-oversized-header-chain-02.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.
Filename: draft-gont-6man-oversized-header-chain
Revision: 02
Title: Security and Interoperability Implications of Oversized IPv6
Header Chains
Creation date: 2012-06-13
WG ID: Individual Submission
Number of pages: 12
URL:
http://www.ietf.org/internet-drafts/draft-gont-6man-oversized-header-chain-02.txt
Status:
http://datatracker.ietf.org/doc/draft-gont-6man-oversized-header-chain
Htmlized: http://tools.ietf.org/html/submission.filename }}-02
Diff:
http://tools.ietf.org/rfcdiff?url2=draft-gont-6man-oversized-header-chain-02
Abstract:
The IPv6 specification allows IPv6 header chains of an arbitrary
size. The specification also allows options which can in turn extend
each of the headers. In those scenarios in which the IPv6 header
chain or options are unusually long and packets are fragmented, or
scenarios in which the fragment size is very small, the first
fragment of a packet may fail to include the entire IPv6 header
chain. This document discusses the interoperability and security
problems of such traffic, and updates RFC 2460 such that the first
fragment of a packet is required to contain the entire IPv6 header
chain.
The IETF Secretariat
Más información sobre la lista de distribución Seguridad