IPv6 payload length check?

"Aitken, Paul" <paul.aitken@intl.att.com> Mon, 03 February 2020 15:30 UTC

Return-Path: <paul.aitken@intl.att.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 948CA120170 for <ipv6@ietfa.amsl.com>; Mon, 3 Feb 2020 07:30:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P2Ec7tgJitKi for <ipv6@ietfa.amsl.com>; Mon, 3 Feb 2020 07:30:50 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77859120961 for <ipv6@ietf.org>; Mon, 3 Feb 2020 07:30:50 -0800 (PST)
Received: from pps.filterd (m0049295.ppops.net [127.0.0.1]) by m0049295.ppops.net-00191d01. (8.16.0.42/8.16.0.42) with SMTP id 013FQYHG041357 for <ipv6@ietf.org>; Mon, 3 Feb 2020 10:30:50 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049295.ppops.net-00191d01. with ESMTP id 2xxnqs8ydh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <ipv6@ietf.org>; Mon, 03 Feb 2020 10:30:49 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 013FUm7K005407 for <ipv6@ietf.org>; Mon, 3 Feb 2020 10:30:48 -0500
Received: from zlp27128.vci.att.com (zlp27128.vci.att.com [135.66.87.50]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 013FUj8n005340 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <ipv6@ietf.org>; Mon, 3 Feb 2020 10:30:45 -0500
Received: from zlp27128.vci.att.com (zlp27128.vci.att.com [127.0.0.1]) by zlp27128.vci.att.com (Service) with ESMTP id 9CA04400A0A8 for <ipv6@ietf.org>; Mon, 3 Feb 2020 15:30:45 +0000 (GMT)
Received: from gbcdcmbx13.intl.att.com (unknown [135.76.180.49]) by zlp27128.vci.att.com (Service) with ESMTPS id 496A0400A0A9 for <ipv6@ietf.org>; Mon, 3 Feb 2020 15:30:45 +0000 (GMT)
Received: from gbcdcmbx17.intl.att.com (135.76.180.53) by gbcdcmbx13.intl.att.com (135.76.180.49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1913.5; Mon, 3 Feb 2020 15:30:43 +0000
Received: from gbcdcmbx17.intl.att.com ([fe80::610b:3cbc:a7b0:614c]) by gbcdcmbx17.intl.att.com ([fe80::610b:3cbc:a7b0:614c%7]) with mapi id 15.01.1913.005; Mon, 3 Feb 2020 15:30:43 +0000
From: "Aitken, Paul" <paul.aitken@intl.att.com>
To: "ipv6@ietf.org" <ipv6@ietf.org>
Subject: IPv6 payload length check?
Thread-Topic: IPv6 payload length check?
Thread-Index: AQHV2qblFLgIwdEdzUiGzzYNpBgEAQ==
Date: Mon, 03 Feb 2020 15:30:43 +0000
Message-ID: <77f55628-6f9d-d06a-4e38-f84d76e716bb@intl.att.com>
References: <90342768-7f25-b9dd-eeae-29db6045b40a@intl.att.com>
In-Reply-To: <90342768-7f25-b9dd-eeae-29db6045b40a@intl.att.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
x-forwarded-message-id: <90342768-7f25-b9dd-eeae-29db6045b40a@intl.att.com>
x-originating-ip: [135.76.180.249]
Content-Type: text/plain; charset="utf-8"
Content-ID: <40229D87FD2C4E4087952CFBA05F3D04@intl.att.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572 definitions=2020-02-03_05:2020-02-02, 2020-02-03 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 mlxlogscore=387 lowpriorityscore=0 suspectscore=0 impostorscore=0 spamscore=0 clxscore=1011 mlxscore=0 malwarescore=0 bulkscore=0 adultscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1911200001 definitions=main-2002030116
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/0hcd5g9tgXHG4iNbrU1r7gVBvfo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2020 15:30:52 -0000

Can anyone point me to a standards reference for the check to validate 
that the IPv6 payload length is less than or equal to the link layer 
frame size upon forwarding a packet?

Thanks,
Paul