{"draft":"draft-ietf-tcpm-tcpsecure-13","doc_id":"RFC5961","title":"Improving TCP's Robustness to Blind In-Window Attacks","authors":["A. Ramaiah","R. Stewart","M. Dalal"],"format":["ASCII","HTML"],"page_count":"19","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"TCP Maintenance and Minor Extensions","abstract":"TCP has historically been considered to be protected against spoofed\r\noff-path packet injection attacks by relying on the fact that it is\r\ndifficult to guess the 4-tuple (the source and destination IP\r\naddresses and the source and destination ports) in combination with\r\nthe 32-bit sequence number(s). A combination of increasing window\r\nsizes and applications using longer-term connections (e.g., H-323 or\r\nBorder Gateway Protocol (BGP) [STANDARDS-TRACK]","pub_date":"August 2010","keywords":["RST","SYN","FIN","attack","Data Injection","vulnerability","blind attacks","BGP","spoof","mitigation"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC9293"],"see_also":[],"doi":"10.17487\/RFC5961","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc5961"}