I-D Action: draft-ietf-6man-predictable-fragment-id-10.txt

internet-drafts@ietf.org Fri, 09 October 2015 09:09 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C68671B2BAA; Fri, 9 Oct 2015 02:09:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pSEhCEHu2j5s; Fri, 9 Oct 2015 02:09:50 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F4B51B2F6C; Fri, 9 Oct 2015 02:09:40 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-6man-predictable-fragment-id-10.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.4.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151009090940.30500.81733.idtracker@ietfa.amsl.com>
Date: Fri, 09 Oct 2015 02:09:40 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/wPADYXuHqLljujalzlEfwT7No2o>
Cc: ipv6@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Oct 2015 09:09:55 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the IPv6 Maintenance Working Group of the IETF.

        Title           : Security Implications of Predictable Fragment Identification Values
        Author          : Fernando Gont
	Filename        : draft-ietf-6man-predictable-fragment-id-10.txt
	Pages           : 19
	Date            : 2015-10-09

Abstract:
   IPv6 specifies the Fragment Header, which is employed for the
   fragmentation and reassembly mechanisms.  The Fragment Header
   contains an "Identification" field which, together with the IPv6
   Source Address and the IPv6 Destination Address of a packet,
   identifies fragments that correspond to the same original datagram,
   such that they can be reassembled together by the receiving host.
   The only requirement for setting the "Identification" field is that
   the corresponding value must be different than that employed for any
   other fragmented packet sent recently with the same Source Address
   and Destination Address.  Some implementations use a simple global
   counter for setting the Identification field, thus leading to
   predictable Identification values.  This document analyzes the
   security implications of predictable Identification values, and
   provides implementation guidance for selecting the Identification
   field of the Fragment Header, such that the aforementioned security
   implications are mitigated.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-6man-predictable-fragment-id/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-6man-predictable-fragment-id-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-6man-predictable-fragment-id-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/