In message <1372377611.3215.141.camel@karl>, Karl Auer writes: > On Fri, 2013-06-28 at 09:31 +1000, Mark Andrews wrote: > > Then add a cryptographic checksum of the original packet when fragmenting. > > 48 bits in a HBH should be enough. > > Why HBH? Is that to prevent it being send in a fragment itself? And, um, > I hate to suggest this, but isn't that sort of exactly what the AH > header is for? I know, I know.... (covers head, ducks)
I really don't care which header it is included in. If we could drop it to 32 bits we could just set the fragment id to the checksum and use one of the reserved bits to indicate that one should treat it as a checksum. My gut feel is that 32 bits is a little to small however. > Regards, K. > > -- > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > Karl Auer ([email protected]) > http://www.biplane.com.au/kauer > http://twitter.com/kauer389 > > GPG fingerprint: B862 FB15 FE96 4961 BC62 1A40 6239 1208 9865 5F9A > Old fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017 > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > [email protected] > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: [email protected] -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
