第8部
次世代インターネットプロトコル (pdf)
v6 分科会
概要
Dual Stack Hosts using the "Bump-In-the-Stack" Technique (BIS)
Introduction
Components
Action Examples
Considerations
Applicability and Limitations
Security Considerations
Possible abuse against IPv6 transition technologies
Abuse of IPv4 compatible address
Abuse of 6to4 address
Abuse of IPv4 mapped address
Attacks by combining different address formats
Conclusions
Security considerations
An IPv6-to-IPv4 transport relay translator
Problem domain
IPv4-to-IPv4 transport relay
IPv6-to-IPv4 transport relay translator
Address mapping
Notes to implementers
Security considerations
Multiple Destination option on IPv6(MDO6)
Introduction
Header Format
This restriction relates to the length limit (8 * 255 octet) of
Packet delivery
Impact for Upper Layer Protocol
Tractable Order List
Peeling MDO6 option headers
Discussion
IPv6 multihoming support at site exit routers
Problem
Goals and non-goals
Basic mechanisms
Extensions for IPv6
Issues with ingress filters in ISP
Observations
Security considerations
Overview of Transition Techniques
Introduction
Translation Techniques of IPv4 and IPv6
Address Mapping
An Extension of Format for IPv6 Scoped Addresses
Introduction
Assumptions and Definitions
Proposal
Combinations of Delimiter Characters
Related Issues
Security Considerations
KAME のマージ状況
1999 インデックスへ戻る
著作権についての注意事項
E-Mail :
secretariat@wide.ad.jp
(C) 1998-2016 WIDE Project