datatracker.ietf.org
Sign in
Version 5.4.0, 2014-04-22
Report a bug

IPv6 packet staining
draft-macaulay-6man-packet-stain-01

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-02-18 (latest revision 2012-08-17)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
http://tools.ietf.org/id/draft-macaulay-6man-packet-stain

Abstract

This document specifies the application of security staining on an IPv6 datagrams and the minimum requirements for IPv6 nodes staining flows, IPv6 nodes forwarding stained packets within a given domain of control, and nodes interpreting stains on flows. The usage of the packet staining destination option enables proactive delivery of security intelligence to IPv6 nodes such as firewalls and intrusion prevention systems, and end-points such servers, workstations, mobile and smart devices and an infinite array of as- yet-to-be-invented sensors and controllers. The usage of packet staining is not intended for use across the open internet, where fragmentation issues associated with increased header size may induce service degradation; packet staining is intended as a security adjunct within a given doamin of control such as an carrier or enterprise network.

Authors

Tyson Macaulay <tyson_macaulay@mcafee.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)