The Weak Authentication and Tracing Option
draft-eastlake-weak-ato-03
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Donald E. Eastlake 3rd | ||
Last updated | 1998-02-25 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The packet switched nature of the Internet Protocol (IP) provides no inherent method to assure that a packet has been issued with a source address authorized for the sender and no inherent method to trace the actual source of a packet. These characteristics make it difficult to take effective action concerning injurious packets which may have originated, by accident or maliciously, virtually anywhere in the Internet. A lightweight IP level option is proposed that provides (1) some assurance that packet's source addresses are authorized for their sender, and (2) limited statistical tracing information such that, if many bad packets are logged, the path to their source will be revealed. These features, even if not implemented throughout the Internet, would provide significantly improved protection against packet level abuse.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)