Tiny Fragments in IPv6
draft-manral-6man-tiny-fragments-issues-00

 
Document Type Expired Internet-Draft (individual)
Last updated 2012-08-05 (latest revision 2012-02-02)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

Email authors IPR References Referenced by Nits Search lists

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-manral-6man-tiny-fragments-issues-00.txt

Abstract

IPv6 fragmentation allows fragments to be sent only by the source of a packet. The Fragment header is used by an IPv6 source to send a packet larger than would fit in the path MTU to its destination. Firewalls generally use 5-tuples to filter out packets. However there are cases where fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document specifies where tiny fragments can be issues.

Authors

Vishwas Manral (vishwas.manral@hp.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)