[LACNIC/Seguridad] Fwd: BCP 156, RFC 6056 on Recommendations for Transport-Protocol Port Randomization

Carlos Martinez-Cagnazzo carlosm3011 en gmail.com
Jue Ene 20 09:54:35 BRST 2011


Felicitaciones Fernando!

2011/1/19 Fernando Gont <fernando en gont.com.ar>:
> Estimados,
>
> Se acaba de publicar el BCP/RFC titulado "Recommendations for
> Transport-Protocol Port Randomization". El mismo se encuentra disponible
> en: http://www.rfc-editor.org/rfc/rfc6056.txt
>
> Dado el tiempo que llevabamos trabajando en este documento, su
> publicación es una mezcla de alegria y alivio. :-)
>
> Pese a que no está suscripto a esta lista, mi agradecimiento publico va
> para Alfred Hoenes, quien tiene un credito implicito en todo lo que he
> publicado hasta el momento. Su dedicacion y rigurosidad han sido
> escenciales para mejorar la calidad del documento resultante.
>
> P.S.: Este RFC debe leerse tomando mate, con Canarias. ;-)
>
> Un abrazo,
>
> Fernando
>
>
>
>
> -------- Original Message --------
> Subject: BCP 156,       RFC 6056 on Recommendations for Transport-Protocol
> Port Randomization
> Date: Tue, 18 Jan 2011 12:31:58 -0800 (PST)
> From: rfc-editor en rfc-editor.org
> To: ietf-announce en ietf.org, rfc-dist en rfc-editor.org
> CC: tsvwg en ietf.org, rfc-editor en rfc-editor.org
>
>
> A new Request for Comments is now available in online RFC libraries.
>
>        BCP 156
>        RFC 6056
>
>        Title:      Recommendations for Transport-Protocol Port
>                    Randomization
>        Author:     M. Larsen, F. Gont
>        Status:     Best Current Practice
>        Stream:     IETF
>        Date:       January 2011
>        Mailbox:    michael.larsen en tieto.com,
>                    fernando en gont.com.ar
>        Pages:      29
>        Characters: 63913
>        See Also:   BCP0156
>
>        I-D Tag:    draft-ietf-tsvwg-port-randomization-09.txt
>
>        URL:        http://www.rfc-editor.org/rfc/rfc6056.txt
>
> During the last few years, awareness has been raised about a number
> of "blind" attacks that can be performed against the Transmission
> Control Protocol (TCP) and similar protocols.  The consequences of
> these attacks range from throughput reduction to broken connections
> or data corruption.  These attacks rely on the attacker's ability to
> guess or know the five-tuple (Protocol, Source Address, Destination
> Address, Source Port, Destination Port) that identifies the transport
> protocol instance to be attacked.  This document describes a number
> of simple and efficient methods for the selection of the client port
> number, such that the possibility of an attacker guessing the exact
> value is reduced.  While this is not a replacement for cryptographic
> methods for protecting the transport-protocol instance, the
> aforementioned port selection algorithms provide improved security
> with very little effort and without any key management overhead.  The
> algorithms described in this document are local policies that may be
> incrementally deployed and that do not violate the specifications of
> any of the transport protocols that may benefit from them, such as
> TCP, UDP, UDP-lite, Stream Control Transmission Protocol (SCTP),
> Datagram Congestion Control Protocol (DCCP), and RTP (provided that
> the RTP application explicitly signals the RTP and RTCP port
> numbers).  This memo documents an Internet Best Current Practice.
>
> This document is a product of the Transport Area Working Group Working
> Group of the IETF.
>
>
> BCP: This document specifies an Internet Best Current Practices for the
> Internet Community, and requests discussion and suggestions for
> improvements. Distribution of this memo is unlimited.
>
> This announcement is sent to the IETF-Announce and rfc-dist lists.
> To subscribe or unsubscribe, see
>  http://www.ietf.org/mailman/listinfo/ietf-announce
>  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist
>
> For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
> For downloading RFCs, see http://www.rfc-editor.org/rfc.html.
>
> Requests for special distribution should be addressed to either the
> author of the RFC in question, or to rfc-editor en rfc-editor.org.  Unless
> specifically noted otherwise on the RFC itself, all RFCs are for
> unlimited distribution.
>
>
> The RFC Editor Team
> Association Management Solutions, LLC
>
>
> _______________________________________________
> IETF-Announce mailing list
> IETF-Announce en ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-announce
>
> _______________________________________________
> Seguridad mailing list
> Seguridad en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/seguridad
>



-- 
--
=========================
Carlos M. Martinez-Cagnazzo
http://www.labs.lacnic.net
=========================



Más información sobre la lista de distribución Seguridad