Skip to main content

Operational issues with Tiny Fragments in IPv6
draft-manral-v6ops-tiny-fragments-issues-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Vishwas Manral
Last updated 2008-09-09
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

IPv6 fragmentation allows fragments to be sent only by the source of a packet. The Fragment header is used by an IPv6 source to send a packet larger than would fit in the path MTU to its destination. Firewalls generally use 5-tuples to filter out packets. However there are cases where fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document specifies where tiny fragments can be issues.

Authors

Vishwas Manral

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)