Skip to main content

More Secure IPv6 Routing Header Processing
draft-smith-6man-more-secure-rh-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Mark Smith
Last updated 2022-08-27 (Latest revision 2022-02-23)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The original IPv6 Type 0 Routing Header has been deprecated due to the security risk of a packet forwarding loop being formed, by specifying a large sequence of alternating IPv6 node addresses to visit. This memo proposes a method to prevent these forwarding loops forming, allowing the IPv6 Type 0 Routing Header to be more securely and more safely used. The method may also be applicable to other unicast source routing scenarios.

Authors

Mark Smith

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)