RFC 5961

Improving TCP's Robustness to Blind In-Window Attacks, August 2010

Canonical URL:
https://www.rfc-editor.org/rfc/rfc5961.txt
File formats:
Plain TextPDF
Status:
PROPOSED STANDARD
Authors:
A. Ramaiah
R. Stewart
M. Dalal
Stream:
IETF
Source:
tcpm (tsv)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC5961

Discuss this RFC: Send questions or comments to tcpm@ietf.org

Other actions: Find Errata (if any)  |  Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

TCP has historically been considered to be protected against spoofed off-path packet injection attacks by relying on the fact that it is difficult to guess the 4-tuple (the source and destination IP addresses and the source and destination ports) in combination with the 32-bit sequence number(s). A combination of increasing window sizes and applications using longer-term connections (e.g., H-323 or Border Gateway Protocol (BGP) [STANDARDS-TRACK]


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Download PDF Reader



Search RFCs
Advanced Search
×