RFC 6104: rogue IPv6 Router Advertisement problem statement

When deploying IPv6, whether IPv6-only or dual-stack, routers are configured to send IPv6 Router Advertisements (RAs) to convey information to nodes that enable them to autoconfigure on the network. This information includes the implied default router address taken from the observed source address o...

Full description

Bibliographic Details
Main Authors: Chown, Tim (Author), Venaas, Stig (Author)
Format: Article
Language:English
Published: 2011-02.
Subjects:
Online Access:Get fulltext
LEADER 01265 am a22001333u 4500
001 346661
042 |a dc 
100 1 0 |a Chown, Tim  |e author 
700 1 0 |a Venaas, Stig  |e author 
245 0 0 |a RFC 6104: rogue IPv6 Router Advertisement problem statement 
260 |c 2011-02. 
856 |z Get fulltext  |u https://eprints.soton.ac.uk/346661/1/rfc6104.txt 
520 |a When deploying IPv6, whether IPv6-only or dual-stack, routers are configured to send IPv6 Router Advertisements (RAs) to convey information to nodes that enable them to autoconfigure on the network. This information includes the implied default router address taken from the observed source address of the RA message, as well as on-link prefix information. However, unintended misconfigurations by users or administrators, or possibly malicious attacks on the network, may lead to bogus RAs being present, which in turn can cause operational problems for hosts on the network. In this document, we summarise the scenarios in which rogue RAs may be observed and present a list of possible solutions to the problem. We focus on the unintended causes of rogue RAs in the text. The goal of this text is to be Informational, and as such to present a framework around which solutions can be proposed and discussed. 
655 7 |a Article