Kathleen Moriarty has entered the following ballot position for
draft-ietf-intarea-gre-mtu-04: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-intarea-gre-mtu/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thanks for your work on this draft, I have a question I'd like to discuss
to see if another security consideration needs to be added.  This should
be very quick to resolve.

Do we need to worry about fragmentation overlap attacks when packets are
reassembled?  I see that you would not have to worry about it in cases
where fragmentation is handled at a different layer as is the case with
some of the methods as it might be addressed at that layer.  Or does it
not matter as the reassembled packets would be forwarded and the device
reassembling wouldn't be processing the payload where an exploit could
avoid detection?




_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to