Recommendations for Transport-Protocol Port Randomization
نویسندگان
چکیده
During the last few years, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the five-tuple (Protocol, Source Address, Destination Address, Source Port, Destination Port) that identifies the transport protocol instance to be attacked. This document describes a number of simple and efficient methods for the selection of the client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods for protecting the transport-protocol instance, the aforementioned port selection algorithms provide improved security with very little effort and without any key management overhead. The algorithms described in this document are local policies that may be incrementally deployed and that do not violate the specifications of any of the transport protocols that may benefit from them, such as TCP, UDP, UDP-lite, Stream Control Transmission Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), and RTP (provided that the RTP application explicitly signals the RTP and RTCP port numbers). Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.
منابع مشابه
Modelling of Sediment Transport in Beris Fishery Port
In this paper, the large amount of sedimentation and the resultant shoreline advancements at the breakwaters of Beris Fishery Port are studied. A series of numerical modeling of waves, sediment transport, and shoreline changes were conducted to predict the complicated equilibrium shoreline. The outputs show that the nearshore directions of wave components are not perpendicular to the coast whic...
متن کاملModeling the Container Selection for Freight Transportation: Case Study of Iran
Significant advantages of intermodal and containerized transport have increased the global interest to this mode of transportation. This growing interest is reflected in the annual volume of container cargo growth. However, the container transport inside Iran does not have a proper place. Comparing the count of containers entering and leaving ports with the statistics obtained from railway and ...
متن کاملInternet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry
This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry. It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry. This document updates IANA’s procedures by ob...
متن کاملDry Port Is A Place for Sustainable Development
The dry port is an intermediate terminal terminal that is directly connected to seaports and has a high capacity in terms of vehicles from which consumers can pick up or drop off standard Kalara units. This port is a combined terminal on the shore that is connected to the coastal port. Necessary and sufficient equipment to deal with traffic caused by several modes of transportation, including r...
متن کاملA user-based frequency-dependent IP header compression architecture
A h D u e to handmdth eonstraints on the wireless link in address (U'S address), destination address, ports, protocol, and an IP network, it is useful to compress the headers SO as to malsome transport protocol information. imize the utlliration of the link. There exist Header Compression of a packet is defined here as the Ip 5-tuple nlprithms that make use of the similarity in consecutive head...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 6056 شماره
صفحات -
تاریخ انتشار 2011