Hi Ron, I’d be interested in updating RFC 6192. Doesn’t seem like it would be too involved and could probably be knocked out pretty quickly.
Stefan > On Jul 19, 2018, at 10:03 AM, Ron Bonica <[email protected]> wrote: > > Folks, > > I would like to propose some new work for OPSEC. Would anybody be interested > in the following topics? > > - Update RFC 6192 - Protecting the Router Control Plane > > Since the publication of 6192, most vendors have upgraded there IPv6 ACL > capabilities. In light of this, we might want to revisit RFC 6192 > > - Expand upon selected topics from draft-ietf-opsec-v6 > > Draft-ietf-opsec-v6 identifies several ipv6 vulnerabilities (e.g. > vulnerabilities associated with extension headers). OPSEC might want to scan > the draft, looking for vulnerabilities at deserve in depth analysis and > mitigation. > > - Update RFC 7872 - Observations On Dropping of Packets with IPv6 Extension > Headers > > RFC 7872 demonstrates that many IPv6 paths drop packets that contain IPv6 > extension headers. Follow on work might update the experimental method so > that a) ) it identifies the Autonomous Systems that drop packets, b) it is > repeated periodically, and c) it publishes its results on a web page. We > might also want to figure out why these autonomous systems are dropping > packets and address the problems that motivate them to do that. > > Ron > > _______________________________________________ > OPSEC mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/opsec _______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec
