BCP 72
RFC 9416
Security Considerations for Transient Numeric Identifiers Employed in Network Protocols, July 2023
- File formats:
- Also available: XML file for editing
- Status:
- BEST CURRENT PRACTICE
- Updates:
- RFC 3552
- Authors:
- F. Gont
I. Arce - Stream:
- IETF
- Source:
- NON WORKING GROUP
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC9416
Discuss this RFC: Send questions or comments to the mailing list iesg@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 9416
Abstract
Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.