Contributed by deanna on from the meta errata dept.
Recently at the CanSecWest conference in Vancouver a fundamental design flaw in the IPv6 protocol was exposed. The problem lies in the routing header 0 of an IPv6 packet which lets the sending party control the path of a packet, which is potentially very dangerous (for further analyses of the problem see the paper from CanSecWest here).
Shortly afterwards Jun Ichiro Itojun Hagino of Kame and OpenBSD took action and it was disabled. After this some heated discussion took place on the IETF mailing lists and now it is looking like the IETF may actually react and do something about it, as reported by Securityfocus.
(Comments are closed)