Analysis of MPTCP residual threats and possible fixes
draft-bagnulo-mptcp-attacks-01
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Marcelo Bagnulo , Christoph Paasch , Fernando Gont , Olivier Bonaventure , Costin Raiciu | ||
| Last updated | 2014-04-04 (Latest revision 2013-10-01) | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-bagnulo-mptcp-attacks-01.txt
Abstract
This documents performs an analysis of the residual threats for MPTCP and explores possible solutions to them.
Authors
Marcelo Bagnulo
Christoph Paasch
Fernando Gont
Olivier Bonaventure
Costin Raiciu
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)