Defending Against IP Source Address Spoofing
draft-rfced-info-senie-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Daniel Senie | ||
Last updated | 1996-10-08 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Attacks on public servers by deliberate overloading with TCP sessions is emerging as a significant problem on the Internet. This form of attack is similar to that used against 800 numbers of some organizations by those opposed to their views. Proposed here is a technique that can be implemented in most routers at or near the periphery of the network, which would reduce the efficacy of such attacks and provide network administrators with indication when users of their networks attempt such an attack. The purpose of this memo is to propose a solution to this problem, and hopefully result in a discussion of the issue.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)