Hello Stefan,

Did you get any chance to have a hack to the existing RFC 6192 ?

-éric

On 19/07/2018, 18:15, "OPSEC on behalf of ShortestPathFirst" 
<[email protected] on behalf of [email protected]> wrote:

    Hi Ron,
    
    I’d be interested in updating RFC 6192. Doesn’t seem like it would be too 
involved and could probably be knocked out pretty quickly.
    
    Stefan
    
    > On Jul 19, 2018, at 10:03 AM, Ron Bonica <[email protected]> wrote:
    > 
    > Folks,
    > 
    > I would like to propose some new work for OPSEC. Would anybody be 
interested in the following topics?
    > 
    > - Update RFC 6192 - Protecting the Router Control Plane
    > 
    > Since the publication of 6192, most vendors have upgraded there IPv6 ACL 
capabilities. In light of this, we might want to revisit RFC 6192
    > 
    > - Expand upon selected topics from draft-ietf-opsec-v6
    > 
    > Draft-ietf-opsec-v6 identifies several ipv6 vulnerabilities (e.g. 
vulnerabilities associated with extension headers). OPSEC might want to scan 
the draft, looking for vulnerabilities at deserve in depth analysis and 
mitigation. 
    > 
    > - Update RFC 7872 - Observations On Dropping of Packets with IPv6 
Extension Headers
    > 
    > RFC 7872 demonstrates that many IPv6 paths drop packets that  contain 
IPv6 extension headers. Follow on work might update the experimental method so 
that a) ) it identifies the Autonomous Systems that drop packets, b) it is 
repeated periodically, and c) it publishes its results on a web page. We might 
also want to figure out why these autonomous systems are dropping packets and 
address the problems that motivate them to do that.
    > 
    >                                                                     Ron
    > 
    > _______________________________________________
    > OPSEC mailing list
    > [email protected]
    > https://www.ietf.org/mailman/listinfo/opsec
    
    _______________________________________________
    OPSEC mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/opsec
    

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to