Hello to the list and RA guard evasion technique

Fernando Gont fernando at gont.com.ar
Wed Jun 1 06:25:06 CEST 2011


On 05/29/2011 08:53 AM, Eric Vyncke (evyncke) wrote:

> But, you obviously have found a work-around around the work-around:
> overlapping fragments. Especially if hosts accept it... (which is
> weird BTW but what can we do?). 

The specs have been updated recommending hosts not to accept them --
yes, it'll take time for all hosts to be updated, and some may probably
never be updated.


> The theoretical mitigation would
> force re-assembly in the switch which could lead to a DoS which could
> be worse as it breaks other layer-2 broadcast domains. The standard
> mitigation is SEND of course in all hosts which is not possible right
> now (BTW, I keep hearing rumors that MSFT could do it eventually!).

What about the PKI? How will they solve that?

Thanks,
-- 
Fernando Gont
e-mail: fernando at gont.com.ar || fgont at acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1






More information about the ipv6-ops mailing list