亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3697.txt

?? IPv6協議中flow_label的相關RFC
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
   the correct source address.  The ability to spoof a Flow Label   typically implies being in a position to also forge an address, but   in many cases, spoofing an address may not be interesting to the   spoofer, especially if the spoofer's goal is theft of service, rather   than denial of service.   The latter can be done by a host which is not subject to ingress   filtering [INGR] or by an intermediate router.  Due to its   properties, such is typically useful only for denial of service.  In   the absence of ingress filtering, almost any third party could   instigate such an attack.   In the presence of ingress filtering, forging a non-zero Flow Label   on packets that originated with a zero label, or modifying or   clearing a label, could only occur if an intermediate system such as   a router was compromised, or through some other form of man-in-the-   middle attack.  However, the risk is limited to traffic receiving   better or worse quality of service than intended.  For example, if   Flow Labels are altered or cleared at random, flow classification   will no longer happen as intended, and the altered packets will   receive default treatment.  If a complete 3-tuple is forged, the   altered packets will be classified into the forged flow and will   receive the corresponding quality of service; this will create a   denial of service attack subtly different from one where only theRajahalme, et al.           Standards Track                     [Page 5]RFC 3697             IPv6 Flow Label Specification            March 2004   addresses are forged.  Because it is limited to a single flow   definition, e.g., to a limited amount of bandwidth, such an attack   will be more specific and at a finer granularity than a normal   address-spoofing attack.   Since flows are identified by the complete 3-tuple, ingress filtering   [INGR] will, as noted above, mitigate part of the risk.  If the   source address of a packet is validated by ingress filtering, there   can be a degree of trust that the packet has not transited a   compromised router, to the extent that ISP infrastructure may be   trusted.  However, this gives no assurance that another form of man-   in-the-middle attack has not occurred.   Only applications with an appropriate privilege in a sending host   will be entitled to set a non-zero Flow Label.  Mechanisms for this   are operating system dependent.  Related policy and authorization   mechanisms may also be required; for example, in a multi-user host,   only some users may be entitled to set the Flow Label.  Such   authorization issues are outside the scope of this specification.5.2.  IPsec and Tunneling Interactions   The IPsec protocol, as defined in [IPSec, AH, ESP], does not include   the IPv6 header's Flow Label in any of its cryptographic calculations   (in the case of tunnel mode, it is the outer IPv6 header's Flow Label   that is not included).  Hence modification of the Flow Label by a   network node has no effect on IPsec end-to-end security, because it   cannot cause any IPsec integrity check to fail.  As a consequence,   IPsec does not provide any defense against an adversary's   modification of the Flow Label (i.e., a man-in-the-middle attack).   IPsec tunnel mode provides security for the encapsulated IP header's   Flow Label.  A tunnel mode IPsec packet contains two IP headers: an   outer header supplied by the tunnel ingress node and an encapsulated   inner header supplied by the original source of the packet.  When an   IPsec tunnel is passing through nodes performing flow classification,   the intermediate network nodes operate on the Flow Label in the outer   header.  At the tunnel egress node, IPsec processing includes   removing the outer header and forwarding the packet (if required)   using the inner header.  The IPsec protocol requires that the inner   header's Flow Label not be changed by this decapsulation processing   to ensure that modifications to label cannot be used to launch theft-   or denial-of-service attacks across an IPsec tunnel endpoint.  This   document makes no change to that requirement; indeed it forbids   changes to the Flow Label.Rajahalme, et al.           Standards Track                     [Page 6]RFC 3697             IPv6 Flow Label Specification            March 2004   When IPsec tunnel egress decapsulation processing includes a   sufficiently strong cryptographic integrity check of the encapsulated   packet (where sufficiency is determined by local security policy),   the tunnel egress node can safely assume that the Flow Label in the   inner header has the same value as it had at the tunnel ingress node.   This analysis and its implications apply to any tunneling protocol   that performs integrity checks.  Of course, any Flow Label set in an   encapsulating IPv6 header is subject to the risks described in the   previous section.5.3.  Security Filtering Interactions   The Flow Label does nothing to eliminate the need for packet   filtering based on headers past the IP header, if such filtering is   deemed necessary for security reasons on nodes such as firewalls or   filtering routers.6.  Acknowledgements   The discussion on the topic in the IPv6 WG mailing list has been   instrumental for the definition of this specification.  The authors   want to thank Ran Atkinson, Steve Blake, Jim Bound, Francis Dupont,   Robert Elz, Tony Hain, Robert Hancock, Bob Hinden, Christian Huitema,   Frank Kastenholz, Thomas Narten, Charles Perkins, Pekka Savola,   Hesham Soliman, Michael Thomas, Margaret Wasserman, and Alex Zinin   for their contributions.7.  References7.1.  Normative References   [IPv6]      Deering, S. and R. Hinden, "Internet Protocol Version 6               Specification", RFC 2460, December 1998.   [KEYWORDS]  Bradner, S., "Key words for use in RFCs to indicate               requirement levels", BCP 14, RFC 2119, March 1997.   [RND]       Eastlake, D., Crocker, S. and J. Schiller, "Randomness               Recommendations for Security", RFC 1750, December 1994.7.2.  Informative References   [AH]        Kent, S. and R. Atkinson, "IP Authentication Header", RFC               2402, November 1998.   [ESP]       Kent, S. and R. Atkinson, "IP Encapsulating Security               Payload (ESP)", RFC 2406, November 1998.Rajahalme, et al.           Standards Track                     [Page 7]RFC 3697             IPv6 Flow Label Specification            March 2004   [INGR]      Ferguson, P. and D. Senie, "Network Ingress Filtering:               Defeating Denial of Service Attacks which employ IP               Source Address Spoofing", BCP 38, RFC 2827, May 2000.   [IPSec]     Kent, S. and R. Atkinson, "Security Architecture for the               Internet Protocol", RFC 2401, November 1998.Authors' Addresses   Jarno Rajahalme   Nokia Research Center   P.O. Box 407   FIN-00045 NOKIA GROUP,   Finland   EMail: jarno.rajahalme@nokia.com   Alex Conta   Transwitch Corporation   3 Enterprise Drive   Shelton, CT 06484   USA   EMail: aconta@txc.com   Brian E. Carpenter   IBM Zurich Research Laboratory   Saeumerstrasse 4 / Postfach   8803 Rueschlikon   Switzerland   EMail: brc@zurich.ibm.com   Steve Deering   Cisco Systems, Inc.   170 West Tasman Drive   San Jose, CA 95134-1706   USARajahalme, et al.           Standards Track                     [Page 8]RFC 3697             IPv6 Flow Label Specification            March 2004Full Copyright Statement   Copyright (C) The Internet Society (2004).  This document is subject   to the rights, licenses and restrictions contained in BCP 78 and   except as set forth therein, the authors retain all their rights.   This document and the information contained herein are provided on an   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE   REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE   INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR   IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Intellectual Property   The IETF takes no position regarding the validity or scope of any   Intellectual Property Rights or other rights that might be claimed   to pertain to the implementation or use of the technology   described in this document or the extent to which any license   under such rights might or might not be available; nor does it   represent that it has made any independent effort to identify any   such rights.  Information on the procedures with respect to   rights in RFC documents can be found in BCP 78 and BCP 79.   Copies of IPR disclosures made to the IETF Secretariat and any   assurances of licenses to be made available, or the result of an   attempt made to obtain a general license or permission for the use   of such proprietary rights by implementers or users of this   specification can be obtained from the IETF on-line IPR repository   at http://www.ietf.org/ipr.   The IETF invites any interested party to bring to its attention   any copyrights, patents or patent applications, or other   proprietary rights that may cover technology that may be required   to implement this standard.  Please address the information to the   IETF at ietf-ipr@ietf.org.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Rajahalme, et al.           Standards Track                     [Page 9]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产在线精品一区二区三区不卡| 一区二区三区丝袜| 欧美色图第一页| 国产女同性恋一区二区| 国产农村妇女精品| 97精品久久久久中文字幕| 国产91丝袜在线播放| 国产成人av电影在线播放| 成人国产在线观看| 一本大道久久a久久精二百| 欧美中文字幕亚洲一区二区va在线| 亚洲一区二区三区自拍| 亚洲午夜激情av| 天天做天天摸天天爽国产一区| 日韩成人免费看| 国产精品一线二线三线| kk眼镜猥琐国模调教系列一区二区| 99久久久免费精品国产一区二区| 91麻豆产精品久久久久久| 蜜臀99久久精品久久久久久软件| 91麻豆精品国产自产在线| 国产精品一区一区| 不卡视频一二三四| 欧美区视频在线观看| wwwwxxxxx欧美| 亚洲欧洲国产专区| 日韩国产精品久久久久久亚洲| 久久精品国产99久久6| 成人avav在线| 欧美一二三在线| 亚洲人成精品久久久久久| 日韩精品一级二级| av亚洲精华国产精华| 91精品国模一区二区三区| 国产精品不卡一区二区三区| 久久久久久久久蜜桃| 99久久综合国产精品| 成人免费观看视频| 欧美久久一二三四区| 国产欧美一区二区在线观看| 日本最新不卡在线| 久久久久久影视| 精品对白一区国产伦| 亚洲v日本v欧美v久久精品| 国产精品影视在线| 日韩一区二区视频在线观看| 综合激情成人伊人| 日本欧美大码aⅴ在线播放| 97久久人人超碰| 国产老妇另类xxxxx| 精品久久一区二区| 欧美国产欧美综合| 亚洲福利视频一区| 国产福利电影一区二区三区| 欧美视频中文一区二区三区在线观看| 久久久噜噜噜久久人人看 | 国产精品成人一区二区艾草 | av在线播放成人| 久久免费午夜影院| 欧美一区二区三区精品| 日日摸夜夜添夜夜添国产精品 | 91精品国模一区二区三区| 国产精品久久久一区麻豆最新章节| 丝袜美腿一区二区三区| 成人黄色大片在线观看| 久久久久久97三级| 国模大尺度一区二区三区| 久久久久久久综合日本| 色综合天天综合网国产成人综合天 | 欧美一区二区三区喷汁尤物| 一区二区在线看| 成人丝袜高跟foot| 国产欧美日韩另类视频免费观看| 美女被吸乳得到大胸91| 九九九精品视频| 欧美日韩激情一区| 日本vs亚洲vs韩国一区三区二区 | 国内精品免费在线观看| 91精品免费观看| 日韩高清欧美激情| 国产精品麻豆一区二区| jizz一区二区| 国产一区二区三区视频在线播放| 制服丝袜av成人在线看| 天天av天天翘天天综合网 | 午夜精品视频在线观看| 国产午夜精品一区二区三区嫩草| 激情综合网最新| 精品国产区一区| 高清免费成人av| 亚洲色欲色欲www在线观看| 欧洲一区在线观看| 五月激情六月综合| 欧美一区二区国产| 日本午夜精品一区二区三区电影| 日本道色综合久久| 亚洲国产人成综合网站| 91精品国产一区二区| 国产九色精品成人porny| 亚洲天天做日日做天天谢日日欢 | 日韩欧美精品在线| 亚洲欧美电影院| 7777精品伊人久久久大香线蕉超级流畅| 午夜电影久久久| 欧美大片免费久久精品三p| 国产成+人+日韩+欧美+亚洲 | 欧美性一二三区| 亚洲精品视频在线观看免费| 欧洲视频一区二区| 国产精品天干天干在线综合| 欧美性生交片4| 久久成人18免费观看| 久久久综合激的五月天| 成人性生交大片免费| 综合久久国产九一剧情麻豆| 欧美卡1卡2卡| 久久99国产精品麻豆| 亚洲激情在线播放| 国产在线精品国自产拍免费| 欧美视频一区二区三区四区 | www.爱久久.com| 怡红院av一区二区三区| 91精品婷婷国产综合久久| 国产精品综合一区二区三区| 亚洲国产欧美在线| 国产精品福利影院| 久久久精品免费免费| 欧美一区二区播放| 欧美三级乱人伦电影| www.成人网.com| 国产91精品一区二区麻豆网站| 免费av网站大全久久| 国产精品毛片高清在线完整版| 欧美国产一区视频在线观看| 亚洲免费看黄网站| 国产精品女同一区二区三区| 精品剧情在线观看| 18欧美亚洲精品| 日本一区二区成人在线| 欧美日韩午夜在线| 国产精品一区二区三区乱码| 亚洲欧美一区二区三区久本道91 | 欧美bbbbb| 亚洲国产美国国产综合一区二区| 最新日韩在线视频| 欧美国产国产综合| 国产日产精品一区| 中文字幕av一区 二区| 久久久青草青青国产亚洲免观| 欧美日韩一卡二卡三卡| 色狠狠色狠狠综合| 亚洲乱码国产乱码精品精98午夜| 国产精品嫩草99a| 中文字幕一区二区在线观看| 国产日韩影视精品| 中文字幕亚洲成人| 亚洲色图.com| 亚洲自拍另类综合| 亚洲高清视频中文字幕| 亚洲一区二区三区中文字幕| 夜夜嗨av一区二区三区| 亚洲国产精品欧美一二99| 天堂成人免费av电影一区| 麻豆精品一区二区av白丝在线| 99精品国产一区二区三区不卡| 日韩一区在线看| 精品国产一区二区三区久久久蜜月| 日韩精品一区二区三区中文不卡 | 国产精品亚洲人在线观看| 精品久久一二三区| 午夜欧美在线一二页| 久久综合九色综合欧美亚洲| 欧美韩国日本综合| 亚洲视频 欧洲视频| 夜夜嗨av一区二区三区网页| 男女性色大片免费观看一区二区 | 91丨porny丨国产入口| 在线一区二区三区四区五区| 在线电影国产精品| 久久只精品国产| 亚洲日本va在线观看| 亚洲风情在线资源站| 国产乱码精品一区二区三区忘忧草 | 久久久精品国产免费观看同学| 国产精品久久一卡二卡| 一区二区三区在线高清| 亚洲成人黄色影院| 国产99久久精品| 欧美日韩中字一区| 久久久久久久综合狠狠综合| 一区二区国产视频| 狠狠色狠狠色综合日日91app| 91视频com| 欧美成人女星排行榜| 日韩一区欧美小说| 精品一区二区三区久久久| 色综合视频一区二区三区高清| 日韩欧美国产wwwww| 美脚の诱脚舐め脚责91 | 欧美激情中文字幕|