I-D Action: draft-ietf-6man-nd-extension-headers-00.txt

internet-drafts@ietf.org Fri, 29 June 2012 15:01 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B853221F8750; Fri, 29 Jun 2012 08:01:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.455
X-Spam-Level:
X-Spam-Status: No, score=-102.455 tagged_above=-999 required=5 tests=[AWL=0.144, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UVv6ZPohFm5s; Fri, 29 Jun 2012 08:01:02 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9239821F8697; Fri, 29 Jun 2012 08:01:02 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-6man-nd-extension-headers-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.21p1
Message-ID: <20120629150102.7069.7703.idtracker@ietfa.amsl.com>
Date: Fri, 29 Jun 2012 08:01:02 -0700
Cc: ipv6@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jun 2012 15:01:06 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the IPv6 Maintenance Working Group of the IETF.

	Title           : Security Implications of the Use of IPv6 Extension Headers with IPv6 Neighbor Discovery
	Author(s)       : Fernando Gont
	Filename        : draft-ietf-6man-nd-extension-headers-00.txt
	Pages           : 12
	Date            : 2012-06-29

Abstract:
   This document analyzes the security implications of using IPv6
   Extension Headers with Neighbor Discovery (ND) messages.  It updates
   RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden
   in all Neighbor Discovery messages, thus allowing for simple and
   effective counter-measures for Neighbor Discovery attacks.  Finally,
   it discusses the security implications of using IPv6 fragmentation
   with SEcure Neighbor Discovery (SEND), and provides advice such that
   the aforementioned security implications are mitigated.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-6man-nd-extension-headers

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-6man-nd-extension-headers-00


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/