[tcpm] I-D ACTION:draft-ietf-tcpm-tcpsecure-09.txt

Internet-Drafts@ietf.org Tue, 08 January 2008 16:15 UTC

Return-path: <tcpm-bounces@ietf.org>
Received: from [] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1JCH6X-0002q7-RF; Tue, 08 Jan 2008 11:15:05 -0500
Received: from tcpm by megatron.ietf.org with local (Exim 4.43) id 1JCH6W-0002py-Ev for tcpm-confirm+ok@megatron.ietf.org; Tue, 08 Jan 2008 11:15:04 -0500
Received: from [] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1JCH6V-0002pq-Uf; Tue, 08 Jan 2008 11:15:03 -0500
Received: from ns1.neustar.com ([2001:503:c779:1a::9c9a:108a]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1JCH6V-0002ww-Dd; Tue, 08 Jan 2008 11:15:03 -0500
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com []) by ns1.neustar.com (Postfix) with ESMTP id 3102B26E7E; Tue, 8 Jan 2008 16:15:03 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1JCH6V-0006Vm-3D; Tue, 08 Jan 2008 11:15:03 -0500
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Message-Id: <E1JCH6V-0006Vm-3D@stiedprstage1.ietf.org>
Date: Tue, 08 Jan 2008 11:15:03 -0500
X-Spam-Score: -1.4 (-)
X-Scan-Signature: cf3becbbd6d1a45acbe2ffd4ab88bdc2
Cc: tcpm@ietf.org
Subject: [tcpm] I-D ACTION:draft-ietf-tcpm-tcpsecure-09.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

A New Internet-Draft is available from the on-line Internet-Drafts 
This draft is a work item of the TCP Maintenance and Minor Extensions Working Group of the IETF.

	Title		: Improving TCP's Robustness to Blind In-Window Attacks
	Author(s)	: A. Ramaiah, et al.
	Filename	: draft-ietf-tcpm-tcpsecure-09.txt
	Pages		: 26
	Date		: 2008-1-8
TCP has historically been considered protected against spoofed off-
   path packet injection attacks by relying on the fact that it is
   difficult to guess the 4-tuple (the source and destination IP
   addresses and the source and destination ports) in combination with
   the 32 bit sequence number(s).  A combination of increasing window
   sizes and applications using longer term connections (e.g.  H-323 or
   Border Gateway Protocol [RFC4271]) have left modern TCP
   implementations more vulnerable to these types of spoofed packet
   injection attacks.

   Many of these long term TCP applications tend to have predictable IP
   addresses and ports which makes it far easier for the 4-tuple to be
   guessed.  Having guessed the 4-tuple correctly, an attacker can
   inject a RST, SYN or DATA segment into a TCP connection by
   systematically guessing the sequence number of the spoofed segment to
   be in the current receive window.  This can cause the connection to
   either abort or possibly cause data corruption.  This document
   specifies small modifications to the way TCP handles inbound segments
   that can reduce the chances of a successful attack.

A URL for this Internet-Draft is:

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of 
the message. 
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.

Internet-Drafts are also available by anonymous FTP. Login with the 
username "anonymous" and a password of your e-mail address. After 
logging in, type "cd internet-drafts" and then 
"get draft-ietf-tcpm-tcpsecure-09.txt".

A list of Internet-Drafts directories can be found in
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

Internet-Drafts can also be obtained by e-mail.

Send a message to:
In the body type:
	"FILE /internet-drafts/draft-ietf-tcpm-tcpsecure-09.txt".
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
tcpm mailing list