@techreport{azcorra-tsvwg-tcp-blind-ack-dos-00, number = {draft-azcorra-tsvwg-tcp-blind-ack-dos-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-azcorra-tsvwg-tcp-blind-ack-dos/00/}, author = {Arturo Azcorra and Carlos J. Bernardos and Ignacio Soto}, title = {{DoS vulnerability of TCP by acknowledging not received segments}}, pagetotal = 13, year = 2004, month = feb, day = 5, abstract = {TCP relies in communication peers to implement congestion control by hosts voluntary limiting their own data rate. Nevertheless this assumption introduces unsolved DoS attack opportunities. A DoS attack can be easily performed by a host that acknowledges TCP segments not yet received (maybe even not sent). This document presents and briefly describes the problem, already identified and pointed before, but also shows than it can be easily performed (with very interesting results) and proposes some server-side modifications to TCP stack in order to make this attack more dificult to perform.}, }