2011
DOI: 10.17487/rfc6324
|View full text |Cite
|
Sign up to set email alerts
|

Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…This attack [9] exploits the assumption that destination address of IPv6 packet is valid and reachable via tunnel. The attacker creates an IPv6 packet with a destination address that doesn't exist.…”
Section: Routing Loop Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…This attack [9] exploits the assumption that destination address of IPv6 packet is valid and reachable via tunnel. The attacker creates an IPv6 packet with a destination address that doesn't exist.…”
Section: Routing Loop Attackmentioning
confidence: 99%
“…Similarly, spoof attack can use a source address that does not exist. Hence, a router must verify the existence of source and destination nodes [9] before forwarding it further on the tunnel. One way to verify is to check neighbor cache to see if a valid entry exists for that address.…”
Section: A Using Dual Stack As Preferred Transition Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Routing loop attacks that may exist in some "automatic tunneling" scenarios are documented in [RFC6324]. No opportunities for routing loop attacks have been identified with 4rd.…”
Section: Routing Loop Attacksmentioning
confidence: 99%
“…A risk of routing-loop attacks has been identified in [RFC6324]. Without taking precautions, it applies to some combinations of automatic-tunnel mechanisms such as 6to4, the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), 6rd, and Teredo.…”
Section: Denial Of Servicementioning
confidence: 99%