@misc{rfc6980, series = {Request for Comments}, number = 6980, howpublished = {RFC 6980}, publisher = {RFC Editor}, doi = {10.17487/RFC6980}, url = {https://www.rfc-editor.org/info/rfc6980}, author = {Fernando Gont}, title = {{Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery}}, pagetotal = 10, year = 2013, month = aug, abstract = {This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.}, }