Skip to main content

Fragmentation Considered Very Harmful
draft-mathis-frag-harmful-00

Document Type Expired Internet-Draft (individual)
Author Matt Mathis
Last updated 2004-07-12
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text htmlized pdfized bibtex
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-mathis-frag-harmful-00.txt

Abstract

IPv4 fragmentation is not sufficiently robust for general use in today's Internet. The 16-bit IP identification field is not large enough to prevent frequent missassociated IP fragments and the TCP and UDP checksums are insufficient to prevent the resulting corrupted data from being delivered to higher protocol layers. In this note we describe some easily reproduced experiments demonstrating the problem and estimate the scale the data corruption in the presence of ever growing data rates.

Authors

Matt Mathis

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)