datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Tiny Fragments in IPv6
draft-manral-6man-tiny-fragments-issues-00

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2012-08-05 (latest revision 2012-02-02)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
http://tools.ietf.org/id/draft-manral-6man-tiny-fragments-issues

Abstract

IPv6 fragmentation allows fragments to be sent only by the source of a packet. The Fragment header is used by an IPv6 source to send a packet larger than would fit in the path MTU to its destination. Firewalls generally use 5-tuples to filter out packets. However there are cases where fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document specifies where tiny fragments can be issues.

Authors

Vishwas Manral <vishwas.manral@hp.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)