RFC 7739 on Security Implications of Predictable Fragment Identification Values

rfc-editor@rfc-editor.org Wed, 03 February 2016 01:58 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AB271B3170; Tue, 2 Feb 2016 17:58:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.903
X-Spam-Level:
X-Spam-Status: No, score=-106.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LTRIro3xZJlE; Tue, 2 Feb 2016 17:58:06 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1675F1B3154; Tue, 2 Feb 2016 17:58:06 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id EABC618046A; Tue, 2 Feb 2016 17:57:54 -0800 (PST)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
Subject: RFC 7739 on Security Implications of Predictable Fragment Identification Values
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20160203015754.EABC618046A@rfc-editor.org>
Date: Tue, 02 Feb 2016 17:57:54 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/0WrHOOV85vNPcGxDZiZJFaaoJ_Q>
Cc: drafts-update-ref@iana.org, ipv6@ietf.org, rfc-editor@rfc-editor.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Feb 2016 01:58:07 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 7739

        Title:      Security Implications of Predictable Fragment 
                    Identification Values 
        Author:     F. Gont
        Status:     Informational
        Stream:     IETF
        Date:       February 2016
        Mailbox:    fgont@si6networks.com
        Pages:      20
        Characters: 46433
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-6man-predictable-fragment-id-10.txt

        URL:        https://www.rfc-editor.org/info/rfc7739

        DOI:        http://dx.doi.org/10.17487/RFC7739

IPv6 specifies the Fragment Header, which is employed for the
fragmentation and reassembly mechanisms.  The Fragment Header
contains an "Identification" field that, together with the IPv6
Source Address and the IPv6 Destination Address of a packet,
identifies fragments that correspond to the same original datagram,
such that they can be reassembled together by the receiving host.
The only requirement for setting the Identification field is that the
corresponding value must be different than that employed for any
other fragmented datagram sent recently with the same Source Address
and Destination Address.  Some implementations use a simple global
counter for setting the Identification field, thus leading to
predictable Identification values.  This document analyzes the
security implications of predictable Identification values, and
provides implementation guidance for setting the Identification field
of the Fragment Header, such that the aforementioned security
implications are mitigated.

This document is a product of the IPv6 Maintenance Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC