< draft-bonica-6man-frag-deprecate-00.txt   draft-bonica-6man-frag-deprecate-01.txt >
6man Working Group R. Bonica 6man Working Group R. Bonica
Internet-Draft Juniper Networks Internet-Draft Juniper Networks
Updates: RFC 2460 (if approved) W. Kumari Updates: RFC 2460 (if approved) W. Kumari
Intended status: Standards Track Google, Inc. Intended status: Standards Track Google, Inc.
Expires: December 22, 2013 June 20, 2013 Expires: December 23, 2013 R. Bush
Internet Initiative Japan
June 21, 2013
IPv6 Fragment Header Deprecated IPv6 Fragment Header Deprecated
draft-bonica-6man-frag-deprecate-00 draft-bonica-6man-frag-deprecate-01
Abstract Abstract
This memo deprecates the IPv6 Fragment Header. It provides reasons This memo deprecates the IPv6 Fragment Header. It provides reasons
for deprecation and updates RFC 2460. for deprecation and updates RFC 2460.
Requirements Language Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
skipping to change at page 1, line 38 skipping to change at page 1, line 40
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 22, 2013. This Internet-Draft will expire on December 23, 2013.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 21 skipping to change at page 2, line 23
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Case For Deprecation . . . . . . . . . . . . . . . . . . . . 3 2. Case For Deprecation . . . . . . . . . . . . . . . . . . . . 3
2.1. Resource Conservation . . . . . . . . . . . . . . . . . . 3 2.1. Resource Conservation . . . . . . . . . . . . . . . . . . 3
2.2. Fragmentation Is Rare . . . . . . . . . . . . . . . . . . 3 2.2. Fragmentation Is Rare . . . . . . . . . . . . . . . . . . 3
2.2.1. UDP-based Applications That Rely on Fragmentation . . 4 2.2.1. UDP-based Applications That Rely on Fragmentation . . 4
2.3. Attack Vectors . . . . . . . . . . . . . . . . . . . . . 4 2.3. Attack Vectors . . . . . . . . . . . . . . . . . . . . . 4
2.4. Operator Behavior . . . . . . . . . . . . . . . . . . . . 5 2.4. Operator Behavior . . . . . . . . . . . . . . . . . . . . 5
3. Recommendation . . . . . . . . . . . . . . . . . . . . . . . 5 3. Recommendation . . . . . . . . . . . . . . . . . . . . . . . 5
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
5. Security Considerations . . . . . . . . . . . . . . . . . . . 5 5. Security Considerations . . . . . . . . . . . . . . . . . . . 5
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
7.1. Normative References . . . . . . . . . . . . . . . . . . 6 7.1. Normative References . . . . . . . . . . . . . . . . . . 6
7.2. Informative References . . . . . . . . . . . . . . . . . 6 7.2. Informative References . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction 1. Introduction
Each link on the Internet is characterized by a Maximum Transmission Each link on the Internet is characterized by a Maximum Transmission
Unit (MTU). A link's MTU represents the maximum packet size that can Unit (MTU). A link's MTU represents the maximum packet size that can
be conveyed over the link, without fragmentation. MTU is a be conveyed over the link, without fragmentation. MTU is a
skipping to change at page 4, line 21 skipping to change at page 4, line 26
back to sending messages that are shorter than the default effective back to sending messages that are shorter than the default effective
MTU for sending." The effective MTU for IPv6 is 1280 bytes. MTU for sending." The effective MTU for IPv6 is 1280 bytes.
Because many UDP-based applications follow the above-quoted Because many UDP-based applications follow the above-quoted
recommendation, IPv6 fragments carrying UDP traffic are also rarely recommendation, IPv6 fragments carrying UDP traffic are also rarely
observed on the Internet. observed on the Internet.
2.2.1. UDP-based Applications That Rely on Fragmentation 2.2.1. UDP-based Applications That Rely on Fragmentation
The following is a list of UDP-based applications that do not follow The following is a list of UDP-based applications that do not follow
the recommendation of [RFC5405] and rely in IPv6 fragmentation: the recommendation of [RFC5405] and rely in IPv6 fragmentation:
o DNSSEC [RFC4035] o DNSSEC [RFC4035]. (However, it is useful to note the DNS queries
and responses can run over TCP.)
The effectiveness of these protocols may currently be degraded by The effectiveness of these protocols may currently be degraded by
operator behavior. SeeSection 2.4 for details. operator behavior. SeeSection 2.4 for details.
2.3. Attack Vectors 2.3. Attack Vectors
Security researchers have found and continue to find attack vectors Security researchers have found and continue to find attack vectors
that rely on IP fragmentation. For example, that rely on IP fragmentation. For example,
[I-D.ietf-6man-oversized-header-chain] and [I-D.ietf-6man-oversized-header-chain] and
[I-D.ietf-6man-nd-extension-headers] describe variants of the tiny [I-D.ietf-6man-nd-extension-headers] describe variants of the tiny
skipping to change at page 7, line 43 skipping to change at page 8, line 4
Authors' Addresses Authors' Addresses
Ron Bonica Ron Bonica
Juniper Networks Juniper Networks
2251 Corporate Park Drive 2251 Corporate Park Drive
Herndon, Virginia 20170 Herndon, Virginia 20170
USA USA
Email: rbonica@juniper.net Email: rbonica@juniper.net
Warren Kumari
Warren
Google, Inc. Google, Inc.
1600 Amphitheatre Parkway 1600 Amphitheatre Parkway
Mountainview, California 94043 Mountainview, California 94043
USA USA
Email: warren@kumari.net Email: warren@kumari.net
Randy Bush
Internet Initiative Japan
5147 Crystal Springs
Bainbridge Island Washington
USA
Email: randy@psg.com
 End of changes. 8 change blocks. 
8 lines changed or deleted 10 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/