| < draft-ietf-6man-deprecate-atomfrag-generation-05.txt | draft-ietf-6man-deprecate-atomfrag-generation-06.txt > | |||
|---|---|---|---|---|
| IPv6 maintenance Working Group (6man) F. Gont | IPv6 maintenance Working Group (6man) F. Gont | |||
| Internet-Draft SI6 Networks / UTN-FRH | Internet-Draft SI6 Networks / UTN-FRH | |||
| Intended status: Informational W. Liu | Intended status: Informational W. Liu | |||
| Expires: July 23, 2016 Huawei Technologies | Expires: October 6, 2016 Huawei Technologies | |||
| T. Anderson | T. Anderson | |||
| Redpill Linpro | Redpill Linpro | |||
| January 20, 2016 | April 4, 2016 | |||
| Generation of IPv6 Atomic Fragments Considered Harmful | Generation of IPv6 Atomic Fragments Considered Harmful | |||
| draft-ietf-6man-deprecate-atomfrag-generation-05 | draft-ietf-6man-deprecate-atomfrag-generation-06 | |||
| Abstract | Abstract | |||
| RFC2460 requires that when a host receives an ICMPv6 "Packet Too Big" | This document discusses the security implications of the generation | |||
| message reporting an MTU smaller than 1280 bytes, the host includes a | of IPv6 atomic fragments and a number of interoperability issues | |||
| Fragment Header in all subsequent packets sent to that destination, | ||||
| without reducing the assumed Path-MTU. The simplicity with which | ||||
| ICMPv6 "Packet Too Big" messages can be forged means that an attacker | ||||
| can leverage this functionality (the generation of IPv6 atomic | ||||
| fragments) to trigger the use of fragmentation for any arbitrary IPv6 | ||||
| flow, and subsequently perform any fragmentation-based attack. This | ||||
| document discusses the security implications of the generation of | ||||
| IPv6 atomic fragments and a number of interoperability issues | ||||
| associated with IPv6 atomic fragments, and concludes that the | associated with IPv6 atomic fragments, and concludes that the | |||
| aforementioned functionality is undesirable, thus documenting the | aforementioned functionality is undesirable, thus documenting the | |||
| motivation for removing this functionality in the revision of the | motivation for removing this functionality in the revision of the | |||
| core IPv6 protocol specification [I-D.ietf-6man-rfc2460bis]. | core IPv6 protocol specification. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 23, 2016. | This Internet-Draft will expire on October 6, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2016 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Security Implications of the Generation of IPv6 Atomic | |||
| 3. Security Implications of the Generation of IPv6 Atomic | ||||
| Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4. Additional Considerations . . . . . . . . . . . . . . . . . . 5 | 3. Additional Considerations . . . . . . . . . . . . . . . . . . 4 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | |||
| 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 7 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 8 | 7.2. Informative References . . . . . . . . . . . . . . . . . 7 | |||
| Appendix A. Small Survey of OSes that Fail to Produce IPv6 | Appendix A. Small Survey of OSes that Fail to Produce IPv6 | |||
| Atomic Fragments . . . . . . . . . . . . . . . . . . 9 | Atomic Fragments . . . . . . . . . . . . . . . . . . 9 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 1. Introduction | 1. Introduction | |||
| [RFC2460] specifies the IPv6 fragmentation mechanism, which allows | [RFC2460] specifies the IPv6 fragmentation mechanism, which allows | |||
| IPv6 packets to be fragmented into smaller pieces such that they can | IPv6 packets to be fragmented into smaller pieces such that they can | |||
| fit in the Path-MTU to the intended destination(s). | fit in the Path-MTU to the intended destination(s). | |||
| Section 5 of [RFC2460] states that, when a host receives an ICMPv6 | Section 5 of [RFC2460] states that, when a host receives an ICMPv6 | |||
| "Packet Too Big" message [RFC4443] advertising an MTU smaller than | "Packet Too Big" message [RFC4443] advertising an MTU smaller than | |||
| 1280 bytes (the minimum IPv6 MTU), the host is not required to reduce | 1280 bytes (the minimum IPv6 MTU), the host is not required to reduce | |||
| the assumed Path-MTU, but must simply include a Fragment Header in | the assumed Path-MTU, but must simply include a Fragment Header in | |||
| all subsequent packets sent to that destination. The resulting | all subsequent packets sent to that destination. The resulting | |||
| packets will thus *not* be actually fragmented into several pieces, | packets will thus *not* be actually fragmented into several pieces, | |||
| but rather just include a Fragment Header with both the "Fragment | but rather be "atomic fragments" [RFC6946] (i.e., just include a | |||
| Offset" and the "M" flag set to 0 (i.e., "atomic fragments" | Fragment Header with both the "Fragment Offset" and the "M" flag set | |||
| [RFC6946]). [RFC6946] requires that these atomic fragments be | to 0). [RFC6946] requires that these atomic fragments be essentially | |||
| essentially processed by the destination host as non-fragmented | processed by the destination host as non-fragmented traffic (since | |||
| traffic (since there are not really any fragments to be reassembled). | there are not really any fragments to be reassembled). The goal of | |||
| The goal of these atomic fragments is simply to convey an appropriate | these atomic fragments is simply to convey an appropriate | |||
| Identification value to be employed by IPv6/IPv4 translators for the | Identification value to be employed by IPv6/IPv4 translators for the | |||
| resulting IPv4 fragments. | resulting IPv4 fragments. | |||
| While atomic fragments might seem rather benign, there are scenarios | While atomic fragments might seem rather benign, there are scenarios | |||
| in which the generation of IPv6 atomic fragments can be leveraged for | in which the generation of IPv6 atomic fragments can be leveraged for | |||
| performing a number of attacks against the corresponding IPv6 flows. | performing a number of attacks against the corresponding IPv6 flows. | |||
| Since there are concrete security implications arising from the | Since there are concrete security implications arising from the | |||
| generation of IPv6 atomic fragments, and there is no real gain in | generation of IPv6 atomic fragments, and there is no real gain in | |||
| generating IPv6 atomic fragments (as opposed to e.g. having IPv6/IPv4 | generating IPv6 atomic fragments (as opposed to e.g. having IPv6/IPv4 | |||
| translators generate a Fragment Identification value themselves), we | translators generate a Fragment Identification value themselves), we | |||
| conclude that this functionality is undesirable. | conclude that this functionality is undesirable. | |||
| Section 3 briefly discusses the security implications of the | Section 2 briefly discusses the security implications of the | |||
| generation of IPv6 atomic fragments, and describes a specific Denial | generation of IPv6 atomic fragments, and describes a specific Denial | |||
| of Service (DoS) attack vector that leverages the widespread | of Service (DoS) attack vector that leverages the widespread | |||
| filtering of IPv6 fragments in the public Internet. Section 4 | filtering of IPv6 fragments in the public Internet. Section 3 | |||
| provides additional considerations regarding the usefulness of | provides additional considerations regarding the usefulness of | |||
| generating IPv6 atomic fragments. | generating IPv6 atomic fragments. | |||
| 2. Terminology | 2. Security Implications of the Generation of IPv6 Atomic Fragments | |||
| IPv6 atomic fragments: | ||||
| IPv6 packets that contain a Fragment Header with the Fragment | ||||
| Offset set to 0 and the M flag set to 0 (as defined by [RFC6946]). | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | ||||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | ||||
| 3. Security Implications of the Generation of IPv6 Atomic Fragments | ||||
| The security implications of IP fragmentation have been discussed at | The security implications of IP fragmentation have been discussed at | |||
| length in [RFC6274] and [I-D.ietf-6man-predictable-fragment-id]. An | length in [RFC6274] and [RFC7739]. An attacker can leverage the | |||
| attacker can leverage the generation of IPv6 atomic fragments to | generation of IPv6 atomic fragments to trigger the use of | |||
| trigger the use of fragmentation in an arbitrary IPv6 flow and | fragmentation in an arbitrary IPv6 flow and subsequently perform any | |||
| subsequently perform any fragmentation-based attack against legacy | fragmentation-based attack against legacy IPv6 nodes that do not | |||
| IPv6 nodes that do not implement [RFC6946]. | implement [RFC6946]. | |||
| Unfortunately, even nodes that already implement [RFC6946] can be | Unfortunately, even nodes that already implement [RFC6946] can be | |||
| subject to DoS attacks as a result of the generation of IPv6 atomic | subject to DoS attacks as a result of the generation of IPv6 atomic | |||
| fragments. Let us assume that Host A is communicating with Server B, | fragments. Let us assume that Host A is communicating with Server B, | |||
| and that, as a result of the widespread dropping of IPv6 packets that | and that, as a result of the widespread dropping of IPv6 packets that | |||
| contain extension headers (including fragmentation) | contain extension headers (including fragmentation) | |||
| [I-D.ietf-v6ops-ipv6-ehs-in-real-world], some intermediate node | [I-D.ietf-v6ops-ipv6-ehs-in-real-world], some intermediate node | |||
| filters fragments between Host A and Server B. If an attacker sends | filters fragments between Host A and Server B. If an attacker sends | |||
| a forged ICMPv6 "Packet Too Big" (PTB) error message to server B, | a forged ICMPv6 "Packet Too Big" (PTB) error message to server B, | |||
| reporting an MTU smaller than 1280, this will trigger the generation | reporting an MTU smaller than 1280, this will trigger the generation | |||
| skipping to change at page 5, line 5 ¶ | skipping to change at page 4, line 33 ¶ | |||
| headers, the ICMPv6 payload might not even contain any useful | headers, the ICMPv6 payload might not even contain any useful | |||
| information on which to perform validation checks. | information on which to perform validation checks. | |||
| o Upon receipt of one of the aforementioned ICMPv6 "Packet Too Big" | o Upon receipt of one of the aforementioned ICMPv6 "Packet Too Big" | |||
| error messages, the Destination Cache [RFC4861] is usually updated | error messages, the Destination Cache [RFC4861] is usually updated | |||
| to reflect that any subsequent packets to such destination should | to reflect that any subsequent packets to such destination should | |||
| include a Fragment Header. This means that a single ICMPv6 | include a Fragment Header. This means that a single ICMPv6 | |||
| "Packet Too Big" error message might affect multiple communication | "Packet Too Big" error message might affect multiple communication | |||
| instances (e.g., TCP connections) with such destination. | instances (e.g., TCP connections) with such destination. | |||
| o As noted in Section 4, SIIT [RFC6145] (including derivative | o As noted in Section 3, SIIT [RFC6145] (including derivative | |||
| protocols such as Stateful NAT64 [RFC6146]) is the only technology | protocols such as Stateful NAT64 [RFC6146]) is the only technology | |||
| which currently makes use of atomic fragments. Unfortunately, an | which currently makes use of atomic fragments. Unfortunately, an | |||
| IPv6 node cannot easily limit its exposure to the aforementioned | IPv6 node cannot easily limit its exposure to the aforementioned | |||
| attack vector by only generating IPv6 atomic fragments towards | attack vector by only generating IPv6 atomic fragments towards | |||
| IPv4 destinations behind a stateless translator. This is due to | IPv4 destinations behind a stateless translator. This is due to | |||
| the fact that Section 3.3 of [RFC6052] encourages operators to use | the fact that Section 3.3 of [RFC6052] encourages operators to use | |||
| a Network-Specific Prefix (NSP) that maps the IPv4 address space | a Network-Specific Prefix (NSP) that maps the IPv4 address space | |||
| into IPv6. When an NSP is being used, IPv6 addresses representing | into IPv6. When an NSP is being used, IPv6 addresses representing | |||
| IPv4 nodes (reached through a stateless translator) are | IPv4 nodes (reached through a stateless translator) are | |||
| indistinguishable from native IPv6 addresses. | indistinguishable from native IPv6 addresses. | |||
| 4. Additional Considerations | 3. Additional Considerations | |||
| Besides the security assessment provided in Section 3, it is | Besides the security assessment provided in Section 2, it is | |||
| interesting to evaluate the pros and cons of having an IPv6-to-IPv4 | interesting to evaluate the pros and cons of having an IPv6-to-IPv4 | |||
| translating router rely on the generation of IPv6 atomic fragments. | translating router rely on the generation of IPv6 atomic fragments. | |||
| Relying on the generation of IPv6 atomic fragments implies a reliance | Relying on the generation of IPv6 atomic fragments implies a reliance | |||
| on: | on: | |||
| 1. ICMPv6 packets arriving from the translator to the IPv6 node | 1. ICMPv6 packets arriving from the translator to the IPv6 node | |||
| 2. The ability of the nodes receiving ICMPv6 PTB messages reporting | 2. The ability of the nodes receiving ICMPv6 PTB messages reporting | |||
| an MTU smaller than 1280 bytes to actually produce atomic | an MTU smaller than 1280 bytes to actually produce atomic | |||
| skipping to change at page 6, line 47 ¶ | skipping to change at page 6, line 26 ¶ | |||
| 3. ECMP routing [RFC2992] with more than one translator is employed | 3. ECMP routing [RFC2992] with more than one translator is employed | |||
| for e.g., redundancy purposes | for e.g., redundancy purposes | |||
| In such a scenario, if each translator were to select the IPv4 | In such a scenario, if each translator were to select the IPv4 | |||
| Identification on its own (rather than selecting the IPv4 | Identification on its own (rather than selecting the IPv4 | |||
| Identification from the low-order 16-bits of the Fragment | Identification from the low-order 16-bits of the Fragment | |||
| Identification of IPv6 atomic fragments), this could possibly lead to | Identification of IPv6 atomic fragments), this could possibly lead to | |||
| IPv4 Identification collisions. However, since a number of | IPv4 Identification collisions. However, since a number of | |||
| implementations set the IPv6 Fragment Identification according to the | implementations set the IPv6 Fragment Identification according to the | |||
| output of a Pseudo-Random Number Generator (PRNG) (see Appendix B of | output of a Pseudo-Random Number Generator (PRNG) (see Appendix B of | |||
| [I-D.ietf-6man-predictable-fragment-id]) and the translator only | [RFC7739]) and the translator only employs the low-order 16-bits of | |||
| employs the low-order 16-bits of such value, it is very unlikely that | such value, it is very unlikely that relying on the Fragment | |||
| relying on the Fragment Identification of the IPv6 atomic fragment | Identification of the IPv6 atomic fragment will result in a reduced | |||
| will result in a reduced IPv4 Identification collision rate (when | IPv4 Identification collision rate (when compared to the case where | |||
| compared to the case where the translator selects each IPv4 | the translator selects each IPv4 Identification on its own). | |||
| Identification on its own). | ||||
| Finally, we note that [RFC6145] is currently the only "consumer" of | Finally, we note that [RFC6145] is currently the only "consumer" of | |||
| IPv6 atomic fragments, and it correctly and diligently notes (in | IPv6 atomic fragments, and it correctly and diligently notes (in | |||
| Section 6) the possible interoperability problems of relying on IPv6 | Section 6) the possible interoperability problems of relying on IPv6 | |||
| atomic fragments, proposing as a workaround that leads to more robust | atomic fragments, proposing as a workaround that leads to more robust | |||
| behavior and simplified code. | behavior and simplified code. | |||
| 5. IANA Considerations | 4. IANA Considerations | |||
| There are no IANA registries within this document. The RFC-Editor | There are no IANA registries within this document. | |||
| can remove this section before publication of this document as an | ||||
| RFC. | ||||
| 6. Security Considerations | 5. Security Considerations | |||
| This document briefly discusses the security implications of the | This document briefly discusses the security implications of the | |||
| generation of IPv6 atomic fragments, and describes a specific Denial | generation of IPv6 atomic fragments, and describes a specific Denial | |||
| of Service (DoS) attack vector that leverages the widespread | of Service (DoS) attack vector that leverages the widespread | |||
| filtering of IPv6 fragments in the public Internet. It concludes | filtering of IPv6 fragments in the public Internet. It concludes | |||
| that the generation of IPv6 atomic fragments is an undesirable | that the generation of IPv6 atomic fragments is an undesirable | |||
| feature, and documents the motivation for removing this functionality | feature, and documents the motivation for removing this functionality | |||
| from [I-D.ietf-6man-rfc2460bis]. | from [I-D.ietf-6man-rfc2460bis]. | |||
| 7. Acknowledgements | 6. Acknowledgements | |||
| The authors would like to thank (in alphabetical order) Congxiao Bao, | The authors would like to thank (in alphabetical order) Congxiao Bao, | |||
| Bob Briscoe, Brian Carpenter, Tatuya Jinmei, Bob Hinden, Alberto | Bob Briscoe, Brian Carpenter, Tatuya Jinmei, Bob Hinden, Alberto | |||
| Leiva, Xing Li, Jeroen Massar, Erik Nordmark, Qiong Sun, Ole Troan, | Leiva, Xing Li, Jeroen Massar, Erik Nordmark, Qiong Sun, Ole Troan, | |||
| and Tina Tsou, for providing valuable comments on earlier versions of | and Tina Tsou, for providing valuable comments on earlier versions of | |||
| this document. | this document. | |||
| Fernando Gont would like to thank Jan Zorz / Go6 Lab | Fernando Gont would like to thank Jan Zorz / Go6 Lab | |||
| <http://go6lab.si/>, and Jared Mauch / NTT America, for providing | <http://go6lab.si/>, and Jared Mauch / NTT America, for providing | |||
| access to systems and networks that were employed to produce some of | access to systems and networks that were employed to produce some of | |||
| tests that resulted in the publication of this document. | tests that resulted in the publication of this document. | |||
| Additionally, he would like to thank SixXS <https://www.sixxs.net> | Additionally, he would like to thank SixXS <https://www.sixxs.net> | |||
| for providing IPv6 connectivity. | for providing IPv6 connectivity. | |||
| 8. References | 7. References | |||
| 8.1. Normative References | 7.1. Normative References | |||
| [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | |||
| December 1998, <http://www.rfc-editor.org/info/rfc2460>. | December 1998, <http://www.rfc-editor.org/info/rfc2460>. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
| Requirement Levels", BCP 14, RFC 2119, | ||||
| DOI 10.17487/RFC2119, March 1997, | ||||
| <http://www.rfc-editor.org/info/rfc2119>. | ||||
| [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet | [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet | |||
| Control Message Protocol (ICMPv6) for the Internet | Control Message Protocol (ICMPv6) for the Internet | |||
| Protocol Version 6 (IPv6) Specification", RFC 4443, | Protocol Version 6 (IPv6) Specification", RFC 4443, | |||
| DOI 10.17487/RFC4443, March 2006, | DOI 10.17487/RFC4443, March 2006, | |||
| <http://www.rfc-editor.org/info/rfc4443>. | <http://www.rfc-editor.org/info/rfc4443>. | |||
| [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU | [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU | |||
| Discovery", RFC 4821, DOI 10.17487/RFC4821, March 2007, | Discovery", RFC 4821, DOI 10.17487/RFC4821, March 2007, | |||
| <http://www.rfc-editor.org/info/rfc4821>. | <http://www.rfc-editor.org/info/rfc4821>. | |||
| [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
| "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
| DOI 10.17487/RFC4861, September 2007, | DOI 10.17487/RFC4861, September 2007, | |||
| <http://www.rfc-editor.org/info/rfc4861>. | <http://www.rfc-editor.org/info/rfc4861>. | |||
| [RFC6145] Li, X., Bao, C., and F. Baker, "IP/ICMP Translation | [RFC6145] Li, X., Bao, C., and F. Baker, "IP/ICMP Translation | |||
| Algorithm", RFC 6145, DOI 10.17487/RFC6145, April 2011, | Algorithm", RFC 6145, DOI 10.17487/RFC6145, April 2011, | |||
| <http://www.rfc-editor.org/info/rfc6145>. | <http://www.rfc-editor.org/info/rfc6145>. | |||
| 8.2. Informative References | 7.2. Informative References | |||
| [RFC2923] Lahey, K., "TCP Problems with Path MTU Discovery", | ||||
| RFC 2923, DOI 10.17487/RFC2923, September 2000, | ||||
| <http://www.rfc-editor.org/info/rfc2923>. | ||||
| [RFC2992] Hopps, C., "Analysis of an Equal-Cost Multi-Path | [RFC2992] Hopps, C., "Analysis of an Equal-Cost Multi-Path | |||
| Algorithm", RFC 2992, DOI 10.17487/RFC2992, November 2000, | Algorithm", RFC 2992, DOI 10.17487/RFC2992, November 2000, | |||
| <http://www.rfc-editor.org/info/rfc2992>. | <http://www.rfc-editor.org/info/rfc2992>. | |||
| [RFC5927] Gont, F., "ICMP Attacks against TCP", RFC 5927, | [RFC5927] Gont, F., "ICMP Attacks against TCP", RFC 5927, | |||
| DOI 10.17487/RFC5927, July 2010, | DOI 10.17487/RFC5927, July 2010, | |||
| <http://www.rfc-editor.org/info/rfc5927>. | <http://www.rfc-editor.org/info/rfc5927>. | |||
| [RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X. | [RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X. | |||
| skipping to change at page 9, line 13 ¶ | skipping to change at page 8, line 27 ¶ | |||
| April 2011, <http://www.rfc-editor.org/info/rfc6146>. | April 2011, <http://www.rfc-editor.org/info/rfc6146>. | |||
| [RFC6274] Gont, F., "Security Assessment of the Internet Protocol | [RFC6274] Gont, F., "Security Assessment of the Internet Protocol | |||
| Version 4", RFC 6274, DOI 10.17487/RFC6274, July 2011, | Version 4", RFC 6274, DOI 10.17487/RFC6274, July 2011, | |||
| <http://www.rfc-editor.org/info/rfc6274>. | <http://www.rfc-editor.org/info/rfc6274>. | |||
| [RFC6946] Gont, F., "Processing of IPv6 "Atomic" Fragments", | [RFC6946] Gont, F., "Processing of IPv6 "Atomic" Fragments", | |||
| RFC 6946, DOI 10.17487/RFC6946, May 2013, | RFC 6946, DOI 10.17487/RFC6946, May 2013, | |||
| <http://www.rfc-editor.org/info/rfc6946>. | <http://www.rfc-editor.org/info/rfc6946>. | |||
| [I-D.ietf-6man-predictable-fragment-id] | [RFC7739] Gont, F., "Security Implications of Predictable Fragment | |||
| Gont, F., "Security Implications of Predictable Fragment | Identification Values", RFC 7739, DOI 10.17487/RFC7739, | |||
| Identification Values", draft-ietf-6man-predictable- | February 2016, <http://www.rfc-editor.org/info/rfc7739>. | |||
| fragment-id-10 (work in progress), October 2015. | ||||
| [I-D.ietf-v6ops-ipv6-ehs-in-real-world] | [I-D.ietf-v6ops-ipv6-ehs-in-real-world] | |||
| Gont, F., Linkova, J., Chown, T., and S. LIU, | Gont, F., Linkova, J., Chown, T., and S. LIU, | |||
| "Observations on the Dropping of Packets with IPv6 | "Observations on the Dropping of Packets with IPv6 | |||
| Extension Headers in the Real World", draft-ietf-v6ops- | Extension Headers in the Real World", draft-ietf-v6ops- | |||
| ipv6-ehs-in-real-world-02 (work in progress), December | ipv6-ehs-in-real-world-02 (work in progress), December | |||
| 2015. | 2015. | |||
| [I-D.ietf-6man-rfc2460bis] | [I-D.ietf-6man-rfc2460bis] | |||
| Deering, S. and B. Hinden, "Internet Protocol, Version 6 | Deering, S. and B. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", draft-ietf-6man-rfc2460bis-02 (work | (IPv6) Specification", draft-ietf-6man-rfc2460bis-04 (work | |||
| in progress), December 2015. | in progress), March 2016. | |||
| [Morbitzer] | [Morbitzer] | |||
| Morbitzer, M., "TCP Idle Scans in IPv6", Master's Thesis. | Morbitzer, M., "TCP Idle Scans in IPv6", Master's Thesis. | |||
| Thesis number: 670. Department of Computing Science, | Thesis number: 670. Department of Computing Science, | |||
| Radboud University Nijmegen. August 2013, | Radboud University Nijmegen. August 2013, | |||
| <http://www.ru.nl/publish/pages/769526/ | <http://www.ru.nl/publish/pages/769526/ | |||
| m_morbitzer_masterthesis.pdf>. | m_morbitzer_masterthesis.pdf>. | |||
| [JOOL] Leiva Popper, A., "nf_defrag_ipv4 and nf_defrag_ipv6", | [JOOL] Leiva Popper, A., "nf_defrag_ipv4 and nf_defrag_ipv6", | |||
| April 2015, <https://github.com/NICMx/Jool/wiki/ | April 2015, <https://github.com/NICMx/Jool/wiki/ | |||
| End of changes. 28 change blocks. | ||||
| 82 lines changed or deleted | 50 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||