This document analyzes the security implications of using IPv6 Extension
Headers with Neighbor Discovery (ND) messages. It updates RFC 4861 such
that use of the IPv6 Fragmentation Header is forbidden in all Neighbor
Discovery messages, thus allowing for simple and effective
counter-measures for Neighbor Discovery attacks. Finally, it discusses
the security implications of using IPv6 fragmentation with SEcure
Neighbor Discovery (SEND), and formally updates RFC 3971 to provide
advice regarding how the aforementioned security implications can be
Working Group Summary:
There is working support for this document. It has been discussed on the
mailing list and in face to face 6man sessions. The chairs did a review
that improved the quality of the document.
No known implementations.
Who is the Document Shepherd? Who is the Responsible Area Director?
Bob Hinden, Document Shepherd
Brian Haberman, Internet AD
RFC Editor Note
splitting the necessary information into multiple RA messages
splitting the necessary information into multiple Router Advertisement (RA)
options such as the CGA option
options such as the Cryptographically Generated Address (CGA) option
that would result in fragmented CPA messages.
that would result in fragmented Certification Path Advertisement (CPA) messages.