Survey of Security Hardening Methods for Transmission Control Protocol (TCP) Implementations
draft-ietf-tcpm-tcp-security-03
| Document | Type | Expired Internet-Draft (tcpm WG) | |
|---|---|---|---|
| Author | Fernando Gont | ||
| Last updated | 2012-09-13 (Latest revision 2012-03-12) | ||
| Stream | Internet Engineering Task Force (IETF) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | WG state | WG Document | |
| Document shepherd | (None) | ||
| IESG | IESG state | Expired | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-ietf-tcpm-tcp-security-03.txt
https://www.ietf.org/archive/id/draft-ietf-tcpm-tcp-security-03.txt
Abstract
This document surveys methods to harden Transmission Control Protocol (TCP) implementations. It provides an overview of known attacks and refers to the corresponding solutions in the TCP standards.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)