Inappropriate TCP Resets Considered Harmful
نویسنده
چکیده
منابع مشابه
TCP Extensions Considered Harmful
This RFC comments on recent proposals to extend TCP. It argues that the backward compatible extensions proposed in RFC’s 1072 and 1185 should not be pursued, and proposes an alternative way to evolve the Internet protocol suite. Its purpose is to stimulate discussion in the Internet community.
متن کاملTowards a Comprehensive Picture of the Great Firewall's DNS Censorship
China’s Great Firewall passively inspects network traffic and disrupts unwanted communication by injecting forged DNS replies or TCP resets. We attempted to comprehensively examine the structure of the DNS injector, using queries from both within and outside China. Using these probes, we were able to localize the DNS monitors’ locations, extract the firewall’s DNS blacklist of approximately 15,...
متن کاملImproving End-to-End Performance of TCP Using Link-Layer Retransmissions over Mobile Internetworks
TCP does not perform well in networks with high packet error rates, such as those with wireless links, since TCP assumes network congestion to be the major cause for packet losses. Wireless losses make TCP unnecessarily initiate its congestion control mechanism which results in poor performance in the form of low throughput and high interactive delay. We investigate, through computer simulation...
متن کاملTowards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out in a timely and accurate manner, the analysis required to detect network abusers. The problem is made even more difficult with the devious techniques (e.g. spoofing) used by the hackers. Intrusions are in general prec...
متن کاملIgnoring the Great Firewall of China
The so-called “Great Firewall of China” operates, in part, by inspecting TCP packets for keywords that are to be blocked. If the keyword is present, TCP reset packets (viz: with the RST flag set) are sent to both endpoints of the connection, which then close. However, because the original packets are passed through the firewall unscathed, if the endpoints completely ignore the firewall’s resets...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- RFC
دوره 3360 شماره
صفحات -
تاریخ انتشار 2002