2014
DOI: 10.17487/rfc7112
|View full text |Cite
|
Sign up to set email alerts
|

Implications of Oversized IPv6 Header Chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…With IPv6 connectivity come two forms of security issues. The first type are the set of completely new vulnerabilities that stem from IPv6 protocol changes and features (e.g., [27], [51]). Part of the problem for vendors and operators alike is that there are nontrivial technical hurdles to fully supporting IPv6, especially in policy devices, such as firewalls and IDSes.…”
Section: Introductionmentioning
confidence: 99%
“…With IPv6 connectivity come two forms of security issues. The first type are the set of completely new vulnerabilities that stem from IPv6 protocol changes and features (e.g., [27], [51]). Part of the problem for vendors and operators alike is that there are nontrivial technical hurdles to fully supporting IPv6, especially in policy devices, such as firewalls and IDSes.…”
Section: Introductionmentioning
confidence: 99%
“…Long header chains have implications [6] in scenarios where e.g. stateless firewalls need information up to the upper layer protocol: when the packet is fragmented, and due to the long header chain the first fragment does not contain all that needed information, the firewall can possibly not act on that packet appropriately.…”
Section: Misuses and Caveatsmentioning
confidence: 99%
“…For the purposes of this document, the terms "IPv6 Extension Header", "First Fragment", "IPv6 Header Chain", and "Upper-Layer Header" are used as specified in [RFC7112] The first member of the IPv6 Header Chain is always an IPv6 header. For a subsequent header to qualify as a member of the IPv6 Header Chain, it must be referenced by the "Next Header" field of the previous member of the IPv6 Header Chain.…”
Section: Dhcpv6-shield Devicementioning
confidence: 99%
“…This means that, at least in theory, DHCPv6-Shield could result in false-positive blocking of some legitimate (non-DHCPv6-server) packets. However, as noted in [RFC7112], IPv6 packets that fail to include the entire IPv6 Header Chain are virtually impossible to police with stateless filters and firewalls; hence, they are unlikely to survive in real networks.…”
Section: Dhcpv6-shield Implementation Requirementsmentioning
confidence: 99%