All,
I have performed my initial AD review of this draft. The following are my comments on the content. I am open to discussing these in order to move this document forward...


Substantive
----------------

* It would be quite useful to explicitly define "atomic fragment" prior to using it in the document. This could be done in the Introduction in a formal manner and the use of "atomic fragments" in the Abstract can be re-worded.

* The Introduction needs to provide more motivation as to why we should allow these atomic fragments to exist. Please provide the rationale discussed on the mailing list about how v4/v6 translators use the fragmentation information.

* The core source of this attack is that some implementations have predictable algorithms for generating the Fragmentation ID, allowing attackers to launch these types of attacks. It would be good to reference that work in this draft as well.

* What is the purpose of the indented paragraph within the first bullet of the list in section 2? Is it a quote from one of the two referenced RFCs?

* It is not clear to me why the document spends much time on discussing ICMP-based attacks on the source of traffic, especially ones that ignore existing RFCs, when the issue is really with devices that don't do the right thing on the receiving end.

* I am rather disappointed with the Security Considerations section given that this draft is addressing a perceived security vulnerability. In fact, I would like to ask the WG if the solution actually creates an attack vector on receiving hosts. An on-device path could modify packets with Fragmentation headers by setting Offset=0 and M=0. This would cause the receiver to blindly treat the packet as an atomic and pass it up to the upper-layer protocol. Is this an acceptable risk? Obviously, packets protected by IPsec would be immune to this attack. At a minimum, the Security Considerations should spend some time discussing the potential new attacks based on these rules.


Editorial
------------

- Abstract
     * s/IPv6 specification allows/IPv6 specifications allow/

- Introduction
     * s/[RFC2460] allowed/[RFC2460] allows/
     * s/[RFC5722] forbid/[RFC5722] forbids/
     * Provide a forward pointer to Appendix A in paragraph 4

Regards,
Brian
--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to