RFC 5961
Improving TCP's Robustness to Blind In-Window Attacks, August 2010
- File formats:
- Status:
- PROPOSED STANDARD
- Updated by:
- RFC 9293
- Authors:
- A. Ramaiah
R. Stewart
M. Dalal - Stream:
- IETF
- Source:
- tcpm (wit)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC5961
Discuss this RFC: Send questions or comments to the mailing list tcpm@ietf.org
Other actions: View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 5961
Abstract
TCP has historically been considered to be protected against spoofed off-path packet injection attacks by relying on the fact that it is difficult to guess the 4-tuple (the source and destination IP addresses and the source and destination ports) in combination with the 32-bit sequence number(s). A combination of increasing window sizes and applications using longer-term connections (e.g., H-323 or Border Gateway Protocol (BGP) [STANDARDS-TRACK]
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.