database logo graphic

RFC 6324

"Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations", August 2011

Canonical URL:
http://www.rfc-editor.org/rfc/rfc6324.txt
This document is also available in this non-normative format: PDF.
Status:
INFORMATIONAL
Authors:
G. Nakibly
F. Templin
Stream:
IETF
Source:
v6ops (ops)

Cite this RFC: TXT  |  XML

Other actions: Find Errata (if any)  |  Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

This document is concerned with security vulnerabilities in IPv6-in- IPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denial- of-service (DoS) attacks. The first aim of this document is to inform on this attack and its root causes. The second aim is to present some possible mitigation measures. It should be noted that at the time of this writing there are no known reports of malicious attacks exploiting these vulnerabilities. Nonetheless, these vulnerabilities can be activated by accidental misconfiguration. This document is not an Internet Standards Track specification; it is published for informational purposes.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Go to the RFC Editor Homepage.