Analysis of MPTCP residual threats and possible fixes
draft-bagnulo-mptcp-attacks-01
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | Marcelo Bagnulo , Christoph Paasch , Fernando Gont , Olivier Bonaventure , Costin Raiciu | ||
Last updated | 2014-04-04 (latest revision 2013-10-01) | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-bagnulo-mptcp-attacks-01.txt
Abstract
This documents performs an analysis of the residual threats for MPTCP and explores possible solutions to them.
Authors
Marcelo Bagnulo
(marcelo@it.uc3m.es)
Christoph Paasch
(christoph.paasch@uclouvain.be)
Fernando Gont
(fgont@si6networks.com)
Olivier Bonaventure
(Olivier.Bonaventure@uclouvain.be)
Costin Raiciu
(costin.raiciu@cs.pub.ro)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)