Skip to main content

Defending Against IP Source Address Spoofing
draft-rfced-info-senie-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Daniel Senie
Last updated 1996-10-08
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Attacks on public servers by deliberate overloading with TCP sessions is emerging as a significant problem on the Internet. This form of attack is similar to that used against 800 numbers of some organizations by those opposed to their views. Proposed here is a technique that can be implemented in most routers at or near the periphery of the network, which would reduce the efficacy of such attacks and provide network administrators with indication when users of their networks attempt such an attack. The purpose of this memo is to propose a solution to this problem, and hopefully result in a discussion of the issue.

Authors

Daniel Senie

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)