I-D Action: draft-ietf-6man-ipv6-atomic-fragments-00.txt

internet-drafts@ietf.org Thu, 02 February 2012 22:07 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA29421F867C; Thu, 2 Feb 2012 14:07:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.584
X-Spam-Level:
X-Spam-Status: No, score=-102.584 tagged_above=-999 required=5 tests=[AWL=0.015, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 81CbmTbaAL2P; Thu, 2 Feb 2012 14:07:13 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7184621F85D4; Thu, 2 Feb 2012 14:07:13 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-6man-ipv6-atomic-fragments-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120202220713.1563.44684.idtracker@ietfa.amsl.com>
Date: Thu, 02 Feb 2012 14:07:13 -0800
Cc: ipv6@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Feb 2012 22:07:14 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IPv6 Maintenance Working Group of the IETF.

	Title           : Processing of IPv6 "atomic" fragments
	Author(s)       : Fernando Gont
	Filename        : draft-ietf-6man-ipv6-atomic-fragments-00.txt
	Pages           : 14
	Date            : 2012-02-01

   The IPv6 specification allows packets to contain a Fragment Header
   without the packet being actually fragmented into multiple pieces.
   Such packets typically result from hosts that have received an ICMPv6
   "Packet Too Big" error message that advertises a "Next-Hop MTU"
   smaller than 1280 bytes, and are currently processed by some
   implementations as "fragmented traffic".  Thus, by forging ICMPv6
   "Packet Too Big" error messages an attacker can cause hosts to employ
   "atomic fragments", and then launch any fragmentation-based attacks
   against such traffic.  This document discusses the generation of the
   aforementioned "atomic fragments", the corresponding security
   implications, and formally updates RFC 2460 and RFC 5722 such that
   fragmentation-based attack vectors against traffic employing "atomic
   fragments" are completely eliminated.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-6man-ipv6-atomic-fragments-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-6man-ipv6-atomic-fragments-00.txt