Hello Stefan, Did you get any chance to have a hack to the existing RFC 6192 ?
-éric On 19/07/2018, 18:15, "OPSEC on behalf of ShortestPathFirst" <[email protected] on behalf of [email protected]> wrote: Hi Ron, I’d be interested in updating RFC 6192. Doesn’t seem like it would be too involved and could probably be knocked out pretty quickly. Stefan > On Jul 19, 2018, at 10:03 AM, Ron Bonica <[email protected]> wrote: > > Folks, > > I would like to propose some new work for OPSEC. Would anybody be interested in the following topics? > > - Update RFC 6192 - Protecting the Router Control Plane > > Since the publication of 6192, most vendors have upgraded there IPv6 ACL capabilities. In light of this, we might want to revisit RFC 6192 > > - Expand upon selected topics from draft-ietf-opsec-v6 > > Draft-ietf-opsec-v6 identifies several ipv6 vulnerabilities (e.g. vulnerabilities associated with extension headers). OPSEC might want to scan the draft, looking for vulnerabilities at deserve in depth analysis and mitigation. > > - Update RFC 7872 - Observations On Dropping of Packets with IPv6 Extension Headers > > RFC 7872 demonstrates that many IPv6 paths drop packets that contain IPv6 extension headers. Follow on work might update the experimental method so that a) ) it identifies the Autonomous Systems that drop packets, b) it is repeated periodically, and c) it publishes its results on a web page. We might also want to figure out why these autonomous systems are dropping packets and address the problems that motivate them to do that. > > Ron > > _______________________________________________ > OPSEC mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/opsec _______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec _______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec
