Security Considerations for IP Fragment Filtering, October 1995
- File formats:
- Updated by:
- RFC 3128
- G. Ziemba
Cite this RFC: TXT | XML | BibTeX
Discuss this RFC: Send questions or comments to the mailing list email@example.com
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 1858
IP fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document describes two methods of attack as well as remedies to prevent them. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.