[tcpm] I-D ACTION:draft-ietf-tcpm-tcp-antispoof-03.txt

Internet-Drafts@ietf.org Wed, 22 February 2006 20:50 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FC0w0-000539-E9; Wed, 22 Feb 2006 15:50:04 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FC0vy-00050s-Ue; Wed, 22 Feb 2006 15:50:02 -0500
Received: from [156.154.16.129] (helo=cypress.neustar.com) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FC0vy-00070W-5u; Wed, 22 Feb 2006 15:50:02 -0500
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by cypress.neustar.com (8.12.8/8.12.8) with ESMTP id k1MKo10e014625 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 22 Feb 2006 20:50:01 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1FC0vx-0004Pg-Of; Wed, 22 Feb 2006 15:50:01 -0500
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Message-Id: <E1FC0vx-0004Pg-Of@stiedprstage1.ietf.org>
Date: Wed, 22 Feb 2006 15:50:01 -0500
X-Spam-Score: -2.5 (--)
X-Scan-Signature: e1b0e72ff1bbd457ceef31828f216a86
Cc: tcpm@ietf.org
Subject: [tcpm] I-D ACTION:draft-ietf-tcpm-tcp-antispoof-03.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the TCP Maintenance and Minor Extensions Working Group of the IETF.

	Title		: Defending TCP Against Spoofing Attacks
	Author(s)	: J. Touch
	Filename	: draft-ietf-tcpm-tcp-antispoof-03.txt
	Pages		: 27
	Date		: 2006-2-22
	
Recent analysis of potential attacks on core Internet infrastructure 
indicates an increased vulnerability of TCP connections to spurious 
resets (RSTs), sent with forged IP source addresses (spoofing).  TCP 
has always been susceptible to such RST spoofing attacks, which were 
indirectly protected by checking that the RST sequence number was 
inside the current receive window, as well as via the obfuscation of 
TCP endpoint and port numbers.  For pairs of well-known endpoints 
often over predictable port pairs, such as BGP or between web servers 
and well-known large-scale caches, increases in the path bandwidth-
delay product of a connection have sufficiently increased the receive 
window space that off-path third parties can guess a viable RST 
sequence number.  The susceptibility to attack increases as the 
square of the bandwidth, thus presents a significant vulnerability 
for recent high-speed networks.  This document addresses this 
vulnerability, discussing proposed solutions at the transport level 
and their inherent challenges, as well as existing network level 
solutions and the feasibility of their deployment.  This document 
focuses on vulnerabilities due to spoofed TCP segments, and includes 
a discussion of related ICMP spoofing attacks on TCP connections.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-antispoof-03.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-tcpm-tcp-antispoof-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-tcpm-tcp-antispoof-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.
ftp://ftp.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-antispoof-03.txt"><ftp://ftp.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-antispoof-03.txt>
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm