RFC 7739

Security Implications of Predictable Fragment Identification Values, February 2016

File formats:
icon for text file icon for PDF icon for HTML
Status:
INFORMATIONAL
Author:
F. Gont
Stream:
IETF
Source:
6man (int)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC7739

Discuss this RFC: Send questions or comments to the mailing list ipv6@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 7739


Abstract

IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search