第8部 次世代インターネットプロトコル (pdf)

  1. v6 分科会
    1. 概要
    2. Dual Stack Hosts using the "Bump-In-the-Stack" Technique (BIS)
      1. Introduction
      2. Components
      3. Action Examples
      4. Considerations
      5. Applicability and Limitations
      6. Security Considerations
    3. Possible abuse against IPv6 transition technologies
      1. Abuse of IPv4 compatible address
      2. Abuse of 6to4 address
      3. Abuse of IPv4 mapped address
      4. Attacks by combining different address formats
      5. Conclusions
      6. Security considerations
    4. An IPv6-to-IPv4 transport relay translator
      1. Problem domain
      2. IPv4-to-IPv4 transport relay
      3. IPv6-to-IPv4 transport relay translator
      4. Address mapping
      5. Notes to implementers
      6. Security considerations
    5. Multiple Destination option on IPv6(MDO6)
      1. Introduction
      2. Header Format
      3. This restriction relates to the length limit (8 * 255 octet) of
      4. Packet delivery
      5. Impact for Upper Layer Protocol
      6. Tractable Order List
      7. Peeling MDO6 option headers
      8. Discussion
    6. IPv6 multihoming support at site exit routers
      1. Problem
      2. Goals and non-goals
      3. Basic mechanisms
      4. Extensions for IPv6
      5. Issues with ingress filters in ISP
      6. Observations
      7. Security considerations
    7. Overview of Transition Techniques
      1. Introduction
      2. Translation Techniques of IPv4 and IPv6
      3. Address Mapping
    8. An Extension of Format for IPv6 Scoped Addresses
      1. Introduction
      2. Assumptions and Definitions
      3. Proposal
      4. Combinations of Delimiter Characters
      5. Related Issues
      6. Security Considerations
    9. KAME のマージ状況


1999 インデックスへ戻る
WIDE Home Page
(C) 1998-2016 WIDE Project