@techreport{dupont-transient-pseudonat-04, number = {draft-dupont-transient-pseudonat-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-dupont-transient-pseudonat/04/}, author = {Dr. Francis Dupont and Jean-Jacques Bernard}, title = {{Transient pseudo-NAT attacks or how NATs are even more evil than you believed}}, pagetotal = 5, year = 2004, month = jun, day = 29, abstract = {When a 'NAT traversal' capability is added to a class of signaling protocols which can control some traffic aggregation points, an attack based on a temporary access to the path followed by messages exists. Mobile IP {[}1{]} with NAT traversal {[}5{]} or IKE {[}2{]} with NAT traversal {[}6{]}, including the IKEv2 {[}7{]} proposal, are potentially affected by this kind of attacks. This document claims this vulnerability is an intrinsic property of the NAT traversal capability, so is another point where the usage of NATs is very damaging.}, }