{"draft":"draft-ietf-tcpm-rfc1948bis-02","doc_id":"RFC6528","title":"Defending against Sequence Number Attacks","authors":["F. Gont","S. Bellovin"],"format":["ASCII","HTML"],"page_count":"12","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"TCP Maintenance and Minor Extensions","abstract":"This document specifies an algorithm for the generation of TCP\r\nInitial Sequence Numbers (ISNs), such that the chances of an off-path\r\nattacker guessing the sequence numbers in use by a target connection\r\nare reduced. This document revises (and formally obsoletes) RFC\r\n1948, and takes the ISN generation algorithm originally proposed in\r\nthat document to Standards Track, formally updating RFC 793. \r\n[STANDARDS-TRACK]","pub_date":"February 2012","keywords":["TCP security","TCP Sequence Numbers","Sequence Number Randomization","obfuscation","TCP vulnerabilities"],"obsoletes":["RFC1948"],"obsoleted_by":["RFC9293"],"updates":["RFC0793"],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6528","errata_url":null}