亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3697.txt

?? IPv6協議中flow_label的相關RFC
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                       J. RajahalmeRequest for Comments: 3697                                         NokiaCategory: Standards Track                                       A. Conta                                                              Transwitch                                                            B. Carpenter                                                                     IBM                                                              S. Deering                                                                   Cisco                                                              March 2004                     IPv6 Flow Label SpecificationStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2004).  All Rights Reserved.Abstract   This document specifies the IPv6 Flow Label field and the minimum   requirements for IPv6 source nodes labeling flows, IPv6 nodes   forwarding labeled packets, and flow state establishment methods.   Even when mentioned as examples of possible uses of the flow   labeling, more detailed requirements for specific use cases are out   of scope for this document.   The usage of the Flow Label field enables efficient IPv6 flow   classification based only on IPv6 main header fields in fixed   positions.1.  Introduction   A flow is a sequence of packets sent from a particular source to a   particular unicast, anycast, or multicast destination that the source   desires to label as a flow.  A flow could consist of all packets in a   specific transport connection or a media stream.  However, a flow is   not necessarily 1:1 mapped to a transport connection.Rajahalme, et al.           Standards Track                     [Page 1]RFC 3697             IPv6 Flow Label Specification            March 2004   Traditionally, flow classifiers have been based on the 5-tuple of the   source and destination addresses, ports, and the transport protocol   type.  However, some of these fields may be unavailable due to either   fragmentation or encryption, or locating them past a chain of IPv6   option headers may be inefficient.  Additionally, if classifiers   depend only on IP layer headers, later introduction of alternative   transport layer protocols will be easier.   The usage of the 3-tuple of the Flow Label and the Source and   Destination Address fields enables efficient IPv6 flow   classification, where only IPv6 main header fields in fixed positions   are used.   The minimum level of IPv6 flow support consists of labeling the   flows.  IPv6 source nodes supporting the flow labeling MUST be able   to label known flows (e.g., TCP connections, application streams),   even if the node itself would not require any flow-specific   treatment.  Doing this enables load spreading and receiver oriented   resource reservations, for example.  Node requirements for flow   labeling are given in section 3.   Specific flow state establishment methods and the related service   models are out of scope for this specification, but the generic   requirements enabling co-existence of different methods in IPv6 nodes   are set forth in section 4.  The associated scaling characteristics   (such as nodes involved in state establishment, amount of state   maintained by them, and state growth function) will be specific to   particular service models.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in BCP 14, RFC 2119   [KEYWORDS].2.  IPv6 Flow Label Specification   The 20-bit Flow Label field in the IPv6 header [IPv6] is used by a   source to label packets of a flow.  A Flow Label of zero is used to   indicate packets not part of any flow.  Packet classifiers use the   triplet of Flow Label, Source Address, and Destination Address fields   to identify which flow a particular packet belongs to.  Packets are   processed in a flow-specific manner by the nodes that have been set   up with flow-specific state.  The nature of the specific treatment   and the methods for the flow state establishment are out of scope for   this specification.   The Flow Label value set by the source MUST be delivered unchanged to   the destination node(s).Rajahalme, et al.           Standards Track                     [Page 2]RFC 3697             IPv6 Flow Label Specification            March 2004   IPv6 nodes MUST NOT assume any mathematical or other properties of   the Flow Label values assigned by source nodes.  Router performance   SHOULD NOT be dependent on the distribution of the Flow Label values.   Especially, the Flow Label bits alone make poor material for a hash   key.   Nodes keeping dynamic flow state MUST NOT assume packets arriving 120   seconds or more after the previous packet of a flow still belong to   the same flow, unless a flow state establishment method in use   defines a longer flow state lifetime or the flow state has been   explicitly refreshed within the lifetime duration.   The use of the Flow Label field does not necessarily signal any   requirement on packet reordering.  Especially, the zero label does   not imply that significant reordering is acceptable.   If an IPv6 node is not providing flow-specific treatment, it MUST   ignore the field when receiving or forwarding a packet.3.  Flow Labeling Requirements   To enable Flow Label based classification, source nodes SHOULD assign   each unrelated transport connection and application data stream to a   new flow.  The source node MAY also take part in flow state   establishment methods that result in assigning certain packets to   specific flows.  A source node which does not assign traffic to flows   MUST set the Flow Label to zero.   To enable applications and transport protocols to define what packets   constitute a flow, the source node MUST provide means for the   applications and transport protocols to specify the Flow Label values   to be used with their flows.  The use of the means to specify Flow   Label values is subject to appropriate privileges (see section 5.1).   The source node SHOULD be able to select unused Flow Label values for   flows not requesting a specific value to be used.   A source node MUST ensure that it does not unintentionally reuse Flow   Label values it is currently using or has recently used when creating   new flows.  Flow Label values previously used with a specific pair of   source and destination addresses MUST NOT be assigned to new flows   with the same address pair within 120 seconds of the termination of   the previous flow.  The source node SHOULD provide the means for the   applications and transport protocols to specify quarantine periods   longer than the default 120 seconds for individual flows.   To avoid accidental Flow Label value reuse, the source node SHOULD   select new Flow Label values in a well-defined sequence (e.g.,   sequential or pseudo-random) and use an initial value that avoidsRajahalme, et al.           Standards Track                     [Page 3]RFC 3697             IPv6 Flow Label Specification            March 2004   reuse of recently used Flow Label values each time the system   restarts.  The initial value SHOULD be derived from a previous value   stored in non-volatile memory, or in the absence of such history, a   randomly generated initial value using techniques that produce good   randomness properties [RND] SHOULD be used.4.  Flow State Establishment Requirements   To enable flow-specific treatment, flow state needs to be established   on all or a subset of the IPv6 nodes on the path from the source to   the destination(s).  The methods for the state establishment, as well   as the models for flow-specific treatment will be defined in separate   specifications.   To enable co-existence of different methods in IPv6 nodes, the   methods MUST meet the following basic requirements:   (1)  The method MUST provide the means for flow state clean-up from        the IPv6 nodes providing the flow-specific treatment.  Signaling        based methods where the source node is involved are free to        specify flow state lifetimes longer than the default 120        seconds.   (2)  Flow state establishment methods MUST be able to recover from        the case where the requested flow state cannot be supported.5.  Security Considerations   This section considers security issues raised by the use of the Flow   Label, primarily the potential for denial-of-service attacks, and the   related potential for theft of service by unauthorized traffic   (Section 5.1).  Section 5.2 addresses the use of the Flow Label in   the presence of IPsec including its interaction with IPsec tunnel   mode and other tunneling protocols.  We also note that inspection of   unencrypted Flow Labels may allow some forms of traffic analysis by   revealing some structure of the underlying communications.  Even if   the flow label were encrypted, its presence as a constant value in a   fixed position might assist traffic analysis and cryptoanalysis.5.1.  Theft and Denial of Service   Since the mapping of network traffic to flow-specific treatment is   triggered by the IP addresses and Flow Label value of the IPv6   header, an adversary may be able to obtain better service by   modifying the IPv6 header or by injecting packets with false   addresses and/or labels.  Taken to its limits, such theft-of-service   becomes a denial-of-service attack when the modified or injected   traffic depletes the resources available to forward it and otherRajahalme, et al.           Standards Track                     [Page 4]RFC 3697             IPv6 Flow Label Specification            March 2004   traffic streams.  A curiosity is that if a DoS attack were undertaken   against a given Flow Label (or set of Flow Labels), then traffic   containing an affected Flow Label might well experience worse-than-   best-effort network performance.   Note that since the treatment of IP headers by nodes is typically   unverified, there is no guarantee that flow labels sent by a node are   set according to the recommendations in this document.  Therefore,   any assumptions made by the network about header fields such as flow   labels should be limited to the extent that the upstream nodes are   explicitly trusted.   Since flows are identified by the 3-tuple of the Flow Label and the   Source and Destination Address, the risk of theft or denial of   service introduced by the Flow Label is closely related to the risk   of theft or denial of service by address spoofing.  An adversary who   is in a position to forge an address is also likely to be able to   forge a label, and vice versa.   There are two issues with different properties: Spoofing of the Flow   Label only, and spoofing of the whole 3-tuple, including Source and   Destination Address.   The former can be done inside a node which is using or transmitting

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
免费观看成人鲁鲁鲁鲁鲁视频| 亚洲美女视频一区| 日韩手机在线导航| 欧美日韩综合一区| 精品国产精品网麻豆系列 | 久久婷婷一区二区三区| www国产精品av| 久久一夜天堂av一区二区三区| 久久先锋影音av| 2023国产精品| 亚洲免费av高清| 亚洲国产日韩精品| 麻豆精品一区二区| 91免费版在线看| 精品国产91乱码一区二区三区| 国产欧美一区二区精品性色超碰| 亚洲欧美国产三级| 亚洲资源中文字幕| 国产成人精品免费看| 色先锋aa成人| 久久久久国产免费免费 | 欧美三级资源在线| 国产亲近乱来精品视频| 日韩精品久久久久久| 成人网在线免费视频| 欧美喷潮久久久xxxxx| 国产三区在线成人av| 欧美aaa在线| 91精品视频网| 久久成人18免费观看| 91精品国产综合久久久蜜臀粉嫩 | 亚洲成人一区在线| 91视频免费看| 亚洲精品美腿丝袜| 波多野洁衣一区| 久久久久久免费网| 激情文学综合丁香| www国产成人免费观看视频 深夜成人网| 一区二区三区美女视频| 91蝌蚪国产九色| 国产精品萝li| 日本韩国欧美三级| 亚洲午夜激情网页| 日韩视频免费直播| 国产99久久精品| 一区二区三区免费看视频| 色婷婷综合久久久中文一区二区| 亚洲伦在线观看| 色婷婷综合久久久中文一区二区 | 不卡一区二区在线| 国产精品美女久久久久久2018| 成人激情文学综合网| 综合网在线视频| 7777精品伊人久久久大香线蕉经典版下载 | 国产精品 欧美精品| 国产精品理伦片| 欧美精品色综合| 色综合久久久久综合| 久久精品国产99| 日本成人在线不卡视频| 日本一区二区成人| 91精品国产一区二区三区蜜臀| 国产成人高清在线| 天天综合色天天综合| 国产精品欧美精品| 2020国产精品久久精品美国| 色综合色狠狠天天综合色| 国产一区在线观看麻豆| 亚洲h在线观看| 午夜视频一区在线观看| 亚洲特黄一级片| 国产精品久久久久久久久久免费看 | 久久精品欧美日韩| 欧美丰满少妇xxxxx高潮对白| 国产成人av电影在线观看| 日本不卡一区二区三区高清视频| 中文字幕av免费专区久久| 日韩欧美亚洲国产另类 | 国产精品丝袜黑色高跟| 久久久精品影视| 国产精品免费久久| 亚洲欧洲日本在线| 国产精品伦一区| 久久久亚洲国产美女国产盗摄 | 亚洲高清免费视频| 亚洲猫色日本管| 午夜久久久久久| 亚洲小说欧美激情另类| 午夜天堂影视香蕉久久| 日本午夜精品一区二区三区电影| 天使萌一区二区三区免费观看| 婷婷丁香激情综合| 成人午夜视频福利| 欧美午夜精品久久久久久超碰| 欧美一区二区久久| 国产欧美精品区一区二区三区| 国产婷婷色一区二区三区四区 | 丁香啪啪综合成人亚洲小说| 99re热视频这里只精品| 一本到高清视频免费精品| 欧美另类z0zxhd电影| 欧美变态口味重另类| 成人欧美一区二区三区白人| 一区二区三区视频在线看| 日韩二区三区在线观看| 国产精品99久久久| 欧美日韩色综合| 国产人成亚洲第一网站在线播放| 一区二区三区四区精品在线视频| 天堂成人免费av电影一区| 99久久精品免费| 日本一区二区三区四区| 日韩不卡在线观看日韩不卡视频| 99久久精品国产毛片| 久久综合狠狠综合久久综合88| 亚洲成人精品一区| 9人人澡人人爽人人精品| 精品久久久久香蕉网| 亚洲高清视频的网址| 色婷婷综合五月| 国产精品久久久久久久久搜平片 | 一区二区激情视频| 色呦呦日韩精品| 亚洲香蕉伊在人在线观| 色综合欧美在线视频区| 亚洲专区一二三| 99久久精品久久久久久清纯| 日韩一区欧美一区| 99re在线精品| 亚洲精品国产第一综合99久久| 国产91在线|亚洲| 国产精品视频你懂的| 岛国一区二区三区| 亚洲美女少妇撒尿| 欧美影片第一页| 国产乱码精品一区二区三区av| 欧美成va人片在线观看| 成人app在线| 亚洲免费观看在线视频| 91精品麻豆日日躁夜夜躁| 日韩精品高清不卡| 国产欧美一区二区三区网站| 97精品国产露脸对白| 三级成人在线视频| 亚洲图片另类小说| 欧美一区二区免费| 欧美日韩一区成人| 激情综合色播五月| 一区二区三区国产| 欧美成人在线直播| 成人精品国产福利| 日韩影视精彩在线| 日本一区二区成人在线| 日韩一区国产二区欧美三区| 色综合久久久久久久| 国产综合久久久久久鬼色| 一区二区三区成人| 国产亚洲短视频| 精品国产一区二区三区久久影院| 成人性视频网站| 狠狠色狠狠色综合| 视频一区视频二区中文| 亚洲精品国产精品乱码不99| 欧美tickling挠脚心丨vk| 欧美一二三四在线| 欧美乱妇15p| 4438x成人网最大色成网站| 欧美日韩在线电影| 欧美精品在线视频| 欧美久久免费观看| 欧美大片一区二区三区| 欧美日韩国产免费一区二区| 欧美日韩国产一区二区三区地区| 成人晚上爱看视频| 91影院在线观看| 色就色 综合激情| 欧美亚洲日本国产| 欧美少妇一区二区| 欧美一区二区三区四区五区 | 秋霞午夜鲁丝一区二区老狼| 亚洲综合视频在线观看| 亚洲国产一二三| 激情文学综合插| 成人黄色一级视频| 欧美日韩精品欧美日韩精品一综合| 一本大道av伊人久久综合| 欧美丰满嫩嫩电影| 日韩欧美在线综合网| 亚洲日本丝袜连裤袜办公室| 亚洲一区二区三区小说| 久久精品国产精品亚洲综合| 精品一二线国产| 欧美高清激情brazzers| 久久精品夜色噜噜亚洲a∨| 亚洲资源在线观看| 国产传媒欧美日韩成人| 欧洲国产伦久久久久久久| 精品国产一区二区三区四区四| 亚洲精品中文字幕在线观看| 久久国产剧场电影|