RFC Errata


Errata Search

 
Source of RFC  
Summary Table Full Records

RFC 9293, "Transmission Control Protocol (TCP)", August 2022

Source of RFC: tcpm (wit)
See Also: RFC 9293 w/ inline errata

Errata ID: 8167
Status: Verified
Type: Technical
Publication Format(s) : TEXT, PDF, HTML

Reported By: Christopher Williams
Date Reported: 2024-11-04
Verifier Name: Zaheduzzaman Sarker
Date Verified: 2025-03-19

Section 3.10.7.3 says:

o  A potential blind reset attack is described in RFC 5961 [9].
            The mitigation described in that document has specific
            applicability explained therein, and is not a substitute for
            cryptographic protection (e.g., IPsec or TCP-AO).  A TCP
            implementation that supports the mitigation described in RFC
            5961 SHOULD first check that the sequence number exactly
            matches RCV.NXT prior to executing the action in the next
            paragraph.

It should say:

[ The text is removed - see notes]

Notes:

This entire bullet is removed as RFC 5961 adds no rules to the handling
of RST segments in the SYN-SENT state.

See the discussion here (https://mailarchive.ietf.org/arch/msg/tcpm/Y5feX5f1YA00gCUyb4yP4iNfdXs/)

Report New Errata



Advanced Search