Measures to prevent security attacks in TCP/IP
draft-dattathrani-tcp-ip-security-01

Document Type Expired Internet-Draft (individual)
Last updated 2003-02-21
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-dattathrani-tcp-ip-security-01.txt

Abstract

The security problems in the internet are due to inherent problems in the TCP/IP stack. The purpose of this draft is to brief on some of the measures to prevent security attacks in TCP/IP network, by changing some of the ways in which the TCP/IP protocol stack works. The security attacks which are addressed in this draft are: 1) ARP(Address Resolution Protocol) spoofing and MAC address cloning 2) TCP Initial sequence number prediction This version offers backward compatibility with cards that do not support the security features mentioned in this draft. In view of this, changes have been made to section 2.3 and a new section (Section 2.4) has been added.

Authors

Dattathrani M (sai_dattathrani@infosys.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)