Tiny Fragments in IPv6
draft-manral-6man-tiny-fragments-issues-00

 
Document
Type Expired Internet-Draft (individual)
Last updated 2012-08-05 (latest revision 2012-02-02)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream
Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG
IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

Email authors IPR References Referenced by Nits Search lists

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
//www.ietf.org/archive/id/draft-manral-6man-tiny-fragments-issues-00.txt

Abstract

IPv6 fragmentation allows fragments to be sent only by the source of a packet. The Fragment header is used by an IPv6 source to send a packet larger than would fit in the path MTU to its destination. Firewalls generally use 5-tuples to filter out packets. However there are cases where fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document specifies where tiny fragments can be issues.

Authors

Vishwas Manral (vishwas.manral@hp.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)