At 08:22 a.m. 22/06/2008, Vishwas Manral wrote:

Though this may not be exactly what you are looking for, you may want
to look at some of the issues we identified a long while back with
IPv6 Tiny Fragments.

http://tools.ietf.org/html/draft-manral-v6ops-tiny-fragments-issues-02

I had a quick look at your document. Here are some quick and dirty comments:

* Your documents talk about specifying a minimum size for non-last fragments. Actually, I think one should be concerned only about the *first* fragment. That's the one that's used to create state at firewalls, etc.

* I don't think imposing such a requirement will, by itself, help to ensure that you have in the first packet all the information you need to apply firewalls rules. It would be trivial for an attacker to comply with such a requirement, but still do not provide all the relevant information that would be needed by the firewall to apply its rules. The attacker could just add one or several extension headers, with lots of PadN options. Thus, it would comply with your requirement, but still avoid sending e.g. the TCP source and destination ports.

Kind regards,

--
Fernando Gont
e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED]
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to