{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:06:44Z","timestamp":1757617604111,"version":"3.44.0"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031859595"},{"type":"electronic","value":"9783031859601"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85960-1_1","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:23:37Z","timestamp":1741245817000},"page":"3-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Razor\u2019s Edge: IPv6 Extension Headers Survivability"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9561-1856","authenticated-orcid":false,"given":"Justin","family":"Iurman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0651-3398","authenticated-orcid":false,"given":"Benoit","family":"Donnet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Albakour, T., Gasser, O., Beverly, R., Smaragdakis, G.: Third time\u2019s not a charm: exploiting SNMPv3 for router fingerprinting. In: Proceedings of the ACM Internet Measurement Conference (IMC), November 2021","DOI":"10.1145\/3487552.3487848"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Albakour, T., Gasser, O., Beverly, R., Smaragdakis, G.: Illuminating router vendor diversity within providers and along network paths geolocation. In: Proceedings of the ACM Internet Measurement Conference (IMC), October 2023","DOI":"10.1145\/3618257.3624813"},{"key":"1_CR3","unstructured":"Alvarez, P., Oprea, F., Rula, J.: Rate-limiting of IPv6 traceroute is widespread: measurements and mitigations, July 2017. https:\/\/shorturl.at\/RyY4l. Accessed 22 May 2024"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Augustin, B., et al.: Avoiding traceroute anomalies with Paris traceroute. In: Proceedings of the ACM Internet Measurement Conference (IMC), October 2006","DOI":"10.1145\/1177080.1177100"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Brockners, F., Bhandari, S., Mizrahi, T.: Data fileds for in-situ operations, administration, and maitenance(Ioam). RFC\u00a09197, Internet Engineering Task Force, May 2022","DOI":"10.17487\/RFC9197"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Carpenter, B., Jiang, S.: Transmission and processing of IPv6 extension headers. RFC\u00a07045, Internet Engineering Task Force, December 2013","DOI":"10.17487\/rfc7045"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Castineyra, I., Chiappa, N., Steenstrup, M.: The Nimrod routing architecture. RFC\u00a01992, Internet Engineering Task Force, August 1996","DOI":"10.17487\/rfc1992"},{"key":"1_CR8","unstructured":"Cisco: TRex: Realistic traffic generator. https:\/\/trex-tgn.cisco.com. Accessed 7 June 2024"},{"key":"1_CR9","unstructured":"Cisco: IPv6 extension headers review and considerations, October 2006. https:\/\/www.cisco.com\/en\/US\/technologies\/tk648\/tk872\/technologies_white_paper0900aecd8054d37d.html. Accessed 4 May 2024"},{"key":"1_CR10","unstructured":"Containerlab: Containerlab. https:\/\/containerlab.dev\/. Accessed 7 Oct 2024"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Conway, J.R., Lex, A., Gehlenborg, N.: UpSetR: an R package for the visualization of intersecting sets and their properties. Bioinformatics 33(18) (2017)","DOI":"10.1093\/bioinformatics\/btx364"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.comcom.2023.10.006","volume":"214","author":"A Custura","year":"2024","unstructured":"Custura, A., Secchi, R., Boswell, E., Fairhurst, G.: Is it possible to extend IPv6? Comput. Commun. 214, 90\u201399 (2024)","journal-title":"Comput. Commun."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet protocol, version 6 (IPv6) specification. RFC\u00a08200, Internet Engineering Task Force, July 2017","DOI":"10.17487\/RFC8200"},{"key":"1_CR14","unstructured":"Elkins, N., Ackermann, M., Deshpande, A.: IPv6 extension headers (performance and diagnostic metics (PDM) destination option) testing across the Internet, July 2022. https:\/\/shorturl.at\/GrC2a. Accessed 19 Apr 2024"},{"key":"1_CR15","unstructured":"Elkins, N., Ackermann, M., Dhody, D.: Deep dive into IPv6 extension header testing. Internet Draft (Work in Progress) draft-elkins-v6ops-eh-deepdive-fw-01, Internet Engineering Task Force, October 2022"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Elkins, N., Hamilton, R., Ackermann, M.: IPv6 performance and diagnostic metrics (PDM) destination option. RFC\u00a08250, Internet Engineering Task Force, September 2017","DOI":"10.17487\/RFC8250"},{"key":"1_CR17","unstructured":"Filsfils, C., Dukes, D., Previdi, S., Leddy, J., Matsushima, S., Voyer, D.: IPv6 segment routing header (SRH). RFC\u00a08754, Internet Engineering Task Force, March 2020"},{"key":"1_CR18","unstructured":"Filsfils, C., Previdi, S., Grinsberg, L., Decraene, B., Likowski, S., Shakir, R.: Segment routing architecture. RFC\u00a08402, Internet Engineering Task Force, July 2018"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Gont, F.: Processing of IPv6 atomic fragments. RFC\u00a06946, Internet Engineering Task Force, May 2013","DOI":"10.17487\/rfc6946"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston, G., Liu, W.: Operational implications of IPv6 packets with extension headers. RFC\u00a09098, Internet Engineering Task Force, September 2021","DOI":"10.17487\/RFC9098"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Gont, F., Linkova, J., Chown, T., Liu, W.: Observations on the dropping of packets with ipv6 extension headers in the real world. RFC\u00a07872, Internet Engineering Task Force, June 2016","DOI":"10.17487\/RFC7872"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Gont, F., Liu, W., Anderson, T.: Generation of IPv6 Atomic Fragments Considered Harmful. RFC\u00a08021, Internet Engineering Task Force, January 2017","DOI":"10.17487\/RFC8021"},{"key":"1_CR23","unstructured":"Google: IPv6 statistics (2008\u20132024). https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html. Accessed 21 May 2024"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Hendrikx, L., Velan, P., Schmidts, R., De\u00a0Boer, P.T., Pras, A.: Threats and surprises behind IPv6 extension headers. In: Proceedings of the IFIP Network Traffic Measurement and Analysis (TMA), June 2017","DOI":"10.23919\/TMA.2017.8002912"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Hui, J., Vasseur, J.P., Culler, D., Manral, V.: An IPv6 routing header for source routes with the routing protocol for low-power and lossy networks (RPL). RFC\u00a06554, Internet Engineering Task Force, March 2012","DOI":"10.17487\/rfc6554"},{"key":"1_CR26","unstructured":"Huston, G.: IPv4 address report (2013\u20132024). https:\/\/ipv4.potaroo.net. Accessed 20 May 2024"},{"key":"1_CR27","unstructured":"Huston, G.: Dealing with IPv6 fragmentation in the DNS, August 2017. https:\/\/blog.apnic.net\/2017\/08\/22\/dealing-ipv6-fragmentation-dns\/. Accessed 25 Apr 2024"},{"key":"1_CR28","unstructured":"Huston, G., Damas, J.: IPv6 fragmentation and EH behaviours, March 2022. https:\/\/www.potaroo.net\/presentations\/2022-03-20-iepg-v6frag.pdf. Accessed 17 Apr 2024"},{"key":"1_CR29","unstructured":"IANA \u2013 Internet Assigned Numbers Authority: Internet protocol version 6 (IPv6) parameters - IPv6 extension header types. Technical report, Internet Assigned Numbers Authority (2024)"},{"key":"1_CR30","unstructured":"iproute2: Introduction to iproute2. https:\/\/tldp.org\/HOWTO\/Adv-Routing-HOWTO\/lartc.iproute2.html"},{"key":"1_CR31","unstructured":"Jaeggli, J., Colitti, L., Kumari, W., Vyncke, E., Kaeo, M., Taylor, T.: Why operators filter framgents and what it implies. Internet Draft (Work in Progress) draft-taylor-v6ops-fragdrop-02, Internet Engineering Task Force, December 2013"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6. RFC\u00a03775, Internet Engineering Task Force, June 2004","DOI":"10.17487\/rfc3775"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP authentication header. RFC\u00a04302, Internet Engineering Task Force, December 2005","DOI":"10.17487\/rfc4302"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP encapsulating security payload (ESP). RFC\u00a02406, Internet Engineering Task Force, November 1998","DOI":"10.17487\/rfc2406"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"L\u00e9as, R., Iurman, J., Vyncke, E., Donnet, B.: Measuring IPv6 extension headers survivability with james. In: Proceedings of the ACM Internet Measurement Conference (IMC), Poster Session, October 2022","DOI":"10.1145\/3517745.3563019"},{"key":"1_CR36","unstructured":"Linux: ping6(8) - Linux man page. https:\/\/linux.die.net\/man\/8\/ping6. Accessed 21 May 2024"},{"key":"1_CR37","unstructured":"LWN.net: net, sched: add clsact qdisc, January 2016. https:\/\/lwn.net\/Articles\/671458\/. Accessed 1 June 2024"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Marechal, E., Donnet, B.: Network fingerprinting: routers under attack. In: Proceedings of the International Workshop on Traffic Measurements for Cybersecurity (WTMC), September 2020","DOI":"10.1109\/EuroSPW51379.2020.00086"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host identity protocol. RFC\u00a05201, Internet Engineering Task Force, April 2008","DOI":"10.17487\/rfc5201"},{"key":"1_CR40","unstructured":"Netcat project: The GNU Netcat project. https:\/\/netcat.sourceforge.net. Accessed 21 May 2024"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Nordmark, E., Bagnulo, M.: Shim6: Level 3 multihoming shim protocol for IPv6. RFC 55533201, Internet Engineering Task Force, June 2009","DOI":"10.17487\/rfc5533"},{"key":"1_CR42","unstructured":"Ouellette, K.: IPv6 Hop-by-hop and Destination Options Forwarding in Routers. Internet Draft (Work in Progress) draft-ouellette-v6ops-eh-router-forwarding-00, Internet Engineering Task Force, March 2024"},{"key":"1_CR43","unstructured":"Scapy Community: Scapy. https:\/\/scapy.net. Accessed 7 May 2024"},{"key":"1_CR44","unstructured":"tc: tc(8) \u2013 linux manual page. https:\/\/man7.org\/linux\/man-pages\/man8\/tc.8.html"},{"key":"1_CR45","unstructured":"The Linux Foundation: eBPF, October 2021. https:\/\/ebpf.io"},{"key":"1_CR46","unstructured":"Tuxology: An entertaining eBPF XDP adventure, May 2017. https:\/\/suchakra.files.wordpress.com\/2017\/05\/cls-xdp1.png?w=696. Accessed 7 May 2024"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Padurean, V.-A., Gasser, O., Bush, R., Feldmann, A.: SRv6: is there anybordy out there? In: Proceedings of the International Workshop on Traffic Measurements for Cybersecurity (WTMC), June 2022","DOI":"10.1109\/EuroSPW55150.2022.00031"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Vyncke, E., Donnet, B., Iurman, J.: Attribution of Internet Probes. RFC\u00a09511, Internet Engineering Task Force, November 2023","DOI":"10.17487\/RFC9511"},{"key":"1_CR49","unstructured":"Vyncke, E., L\u00e9as, R., Iurman, J.: Just another measurement of extension header survivability (JAMES). Internet Draft (Work in Progress) draft-vyncke-v6ops-james-02, Internet Engineering Task Force, July 2022"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85960-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:54:29Z","timestamp":1757141669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85960-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031859595","9783031859601"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85960-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"For our Internet measurement campaigns, we implemented RFC9511\u00a0[] for attribution of Internet probes. In particular, we implemented both in-band and out-of-band recommendations, except for TCP probes where only out-of-band was used to avoid potential packet drops due to the presence of data with a TCPSYN. For in-band, an email address was added to the data payload. For out-of-band, a web server (both HTTP\/HTTPS) was running, with the main page being an alias of \/.well-known\/probing.txt. That text file described the on-going measurement campaign. Until now, it is important to note that no one has contacted us.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Considerations"}},{"value":"The source code of FishNet is available at . The dataset with all our measurements is available at .","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Source Code"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 March 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 March 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/udesa.edu.ar\/pam25","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}