Manish-
At the time we discussed this issue during the formation of TCPSAT and PILC
there was no support in the IETF to standardize ways of spoofing TCP. Our
compromise, and I thought it was a good one, was to write a document
desribing the ways that people spoofed TCP, why they felt they needed to do
it, and to document the risks associated with different mechanisms. This
document has been developed in the PILC working group, has finished working
group last call, and is in review by the IESG for publication as an
Informational RFC -- not an IETF standard. You can find a copy at
http://www.ietf.org/internet-drafts/draft-ietf-pilc-pep-05.txt.
--aaron
> -----Original Message-----
> From: Manish Karir [mailto:[email protected]]
> Sent: Monday, January 15, 2001 1:38 PM
> To: [email protected]
> Subject: spoofing standard??
>
>
>
> I think there is probably enough support on this list and real
> implementation experience to generate some sort of a spoofing
> standard?
>
> if nothing else an informational document which summarizes the
> most "correct" way of implementing this. I know there have been
> papers and descriptions of this before, but something which has the
> blessings of more than just the authors would be quite
> useful...that way
> we would atleast have a common base to argue about :)
>
> does anyone else agree on the need for such a document??
>
> manish karir
>
>
>
This archive was generated by hypermail 2b29 : Mon Jan 15 2001 - 22:39:26 EST