Technical Summary This document is a description fo the sorts of off-path spoofing attacks that TCP is vulnerable to and the various existing ane proposed mitigations of those attacks. It is a fairly detailed discussion of the attacks and forms a good basis for sddressing the problems in TCP as well as starting the discussion for other protocols. More practically, it can be used by designers and implementors to decide which of these strategies are appropriate for their situation. Working Group Summary The draft came in to being primarily becayse the author was concerned that a new draft addressing these vulnerabilities did not adeqyately address prior work or present alternatives to that draft's solutions. Eventaully those concerns were separated into this draft, which the group believes has pedagogical and practical value. Document Quality The document has been endorsed by the working group as being complete and well written pretty universally. Personnel Document Shepherd: Ted Faber Responsible AD: Lars Eggert