Attribution of Internet Probes
draft-vyncke-opsec-probe-attribution-01
Document | Type |
Replaced Internet-Draft
(opsec WG)
Expired & archived
|
|
---|---|---|---|
Authors | Éric Vyncke , Benoit Donnet , Justin Iurman | ||
Last updated | 2022-09-02 (Latest revision 2022-03-03) | ||
Replaced by | draft-ietf-opsec-probe-attribution | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Adopted by a WG | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-opsec-probe-attribution | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. This is similar scan and could be perceived as aggressive. This document proposes a couple of simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.
Authors
Éric Vyncke
Benoit Donnet
Justin Iurman
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)