Technical Summary:
This document analyzes the security implications of using IPv6 Extension
Headers with Neighbor Discovery (ND) messages. It updates RFC 4861 such
that use of the IPv6 Fragmentation Header is forbidden in all Neighbor
Discovery messages, thus allowing for simple and effective
counter-measures for Neighbor Discovery attacks. Finally, it discusses
the security implications of using IPv6 fragmentation with SEcure
Neighbor Discovery (SEND), and formally updates RFC 3971 to provide
advice regarding how the aforementioned security implications can be
prevented.
Working Group Summary:
There is working support for this document. It has been discussed on the
mailing list and in face to face 6man sessions. The chairs did a review
that improved the quality of the document.
Document Quality:
No known implementations.
Personnel:
Who is the Document Shepherd? Who is the Responsible Area Director?
Bob Hinden, Document Shepherd
Brian Haberman, Internet AD
RFC Editor Note
OLD
splitting the necessary information into multiple RA messages
NEW
splitting the necessary information into multiple Router Advertisement (RA)
messages
OLD
options such as the CGA option
NEW
options such as the Cryptographically Generated Address (CGA) option
OLD
that would result in fragmented CPA messages.
NEW
that would result in fragmented Certification Path Advertisement (CPA) messages.