Folks,

FYI, we have updated our I-D in response to the recent discussion on the
mailing list.

The new rev is available at:
<http://www.ietf.org/internet-drafts/draft-gont-6man-ipv6-smurf-amplifier-02.txt>

Any further comments will be greatly appreciated.

Thanks!

Best regards,
Fernando




-------- Original Message --------
From: internet-dra...@ietf.org
To: fg...@si6networks.com
Cc: liushuch...@huawei.com
Subject: New Version Notification for
draft-gont-6man-ipv6-smurf-amplifier-02.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130124102421.26195.78729.idtrac...@ietfa.amsl.com>
Date: Thu, 24 Jan 2013 02:24:21 -0800


A new version of I-D, draft-gont-6man-ipv6-smurf-amplifier-02.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Filename:        draft-gont-6man-ipv6-smurf-amplifier
Revision:        02
Title:           Security Implications of IPv6 Options of Type 10xxxxxx
Creation date:   2013-01-24
WG ID:           Individual Submission
Number of pages: 11
URL:
http://www.ietf.org/internet-drafts/draft-gont-6man-ipv6-smurf-amplifier-02.txt
Status:
http://datatracker.ietf.org/doc/draft-gont-6man-ipv6-smurf-amplifier
Htmlized:
http://tools.ietf.org/html/draft-gont-6man-ipv6-smurf-amplifier-02
Diff:
http://www.ietf.org/rfcdiff?url2=draft-gont-6man-ipv6-smurf-amplifier-02

Abstract:
   When an IPv6 node processing an IPv6 packet does not support an IPv6
   option whose two-highest-order bits of the Option Type are '10', it
   is required to respond with an ICMPv6 Parameter Problem error
   message, even if the Destination Address of the packet was a
   multicast address.  This feature provides an amplification vector,
   opening the door to an IPv6 version of the 'Smurf' Denial-of-Service
   (DoS) attack found in IPv4 networks.  This document discusses the
   security implications of the aforementioned options, and formally
   updates RFC 2460 and RFC 4443 such that this attack vector is
   eliminated.  Additionally, it describes a number of operational
   mitigations that could be deployed against this attack vector.





The IETF Secretariat




--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to