@techreport{gont-tcpm-tcp-seq-validation-04, number = {draft-gont-tcpm-tcp-seq-validation-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-gont-tcpm-tcp-seq-validation/04/}, author = {Fernando Gont and David Borman}, title = {{On the Validation of TCP Sequence Numbers}}, pagetotal = 16, year = 2019, month = mar, day = 11, abstract = {When TCP receives packets that lie outside of the receive window, the corresponding packets are dropped and either an ACK, RST or no response is generated due to the out-of-window packet, with no further processing of the packet. Most of the time, this works just fine and TCP remains stable, especially when a TCP connection has unidirectional data flow. However, there are three scenarios in which packets that are outside of the receive window should still have their ACK field processed, or else a packet war will take place. The aforementioned issues have affected a number of popular TCP implementations, typically leading to connection failures, system crashes, or other undesirable behaviors. This document describes the three scenarios in which the aforementioned issues might arise, and formally updates RFC 793 such that these potential problems are mitigated.}, }