rfc9416v3.txt | rfc9416.txt | |||
---|---|---|---|---|
skipping to change at line 316 ¶ | skipping to change at line 316 ¶ | |||
A vulnerability assessment of the aforementioned transient numeric | A vulnerability assessment of the aforementioned transient numeric | |||
identifiers MUST be performed as part of the specification process. | identifiers MUST be performed as part of the specification process. | |||
Such vulnerability assessment should cover, at least, spoofing, | Such vulnerability assessment should cover, at least, spoofing, | |||
tampering, repudiation, information disclosure, DoS, and elevation of | tampering, repudiation, information disclosure, DoS, and elevation of | |||
privilege. | privilege. | |||
| NOTE: Sections 8 and 9 of [RFC9415] provide a general | | NOTE: Sections 8 and 9 of [RFC9415] provide a general | |||
| vulnerability assessment of transient numeric identifiers, | | vulnerability assessment of transient numeric identifiers, | |||
| along with a vulnerability assessment of common algorithms for | | along with a vulnerability assessment of common algorithms for | |||
| generating transient numeric identifiers. Please see | | generating transient numeric identifiers. Please see | |||
| [Shostack2014] for further guidance on threat modelling. | | [Shostack2014] for further guidance on threat modeling. | |||
Protocol specifications SHOULD NOT employ predictable transient | Protocol specifications SHOULD NOT employ predictable transient | |||
numeric identifiers, except when such predictability is the result of | numeric identifiers, except when such predictability is the result of | |||
their interoperability requirements. | their interoperability requirements. | |||
Protocol specifications that employ transient numeric identifiers | Protocol specifications that employ transient numeric identifiers | |||
SHOULD recommend an algorithm for generating the aforementioned | SHOULD recommend an algorithm for generating the aforementioned | |||
transient numeric identifiers that mitigates the vulnerabilities | transient numeric identifiers that mitigates the vulnerabilities | |||
identified in the previous step, such as those discussed in | identified in the previous step, such as those discussed in | |||
[RFC9415]. | [RFC9415]. | |||
skipping to change at line 474 ¶ | skipping to change at line 474 ¶ | |||
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
(IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
<https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
[RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)", | [RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)", | |||
STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022, | STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022, | |||
<https://www.rfc-editor.org/info/rfc9293>. | <https://www.rfc-editor.org/info/rfc9293>. | |||
[RFC9414] Gont, F. and I. Arce, "Unfortunate History of Transient | [RFC9414] Gont, F. and I. Arce, "Unfortunate History of Transient | |||
Numeric Identifiers", RFC 9414, DOI 10.17487/RFC9414, June | Numeric Identifiers", RFC 9414, DOI 10.17487/RFC9414, July | |||
2023, <https://www.rfc-editor.org/info/rfc9414>. | 2023, <https://www.rfc-editor.org/info/rfc9414>. | |||
[RFC9415] Gont, F. and I. Arce, "On the Generation of Transient | [RFC9415] Gont, F. and I. Arce, "On the Generation of Transient | |||
Numeric Identifiers", RFC 9415, DOI 10.17487/RFC9415, June | Numeric Identifiers", RFC 9415, DOI 10.17487/RFC9415, July | |||
2023, <https://www.rfc-editor.org/info/rfc941v>. | 2023, <https://www.rfc-editor.org/info/rfc941v>. | |||
[Sanfilippo1998a] | [Sanfilippo1998a] | |||
Sanfilippo, S., "about the ip header id", message to the | Sanfilippo, S., "about the ip header id", message to the | |||
Bugtraq mailing list, 14 December 1998, | Bugtraq mailing list, December 1998, | |||
<https://seclists.org/bugtraq/1998/Dec/48>. | <https://seclists.org/bugtraq/1998/Dec/48>. | |||
[Schuba1993] | [Schuba1993] | |||
Schuba, C., "Addressing Weakness in the Domain Name System | Schuba, C., "Addressing Weakness in the Domain Name System | |||
Protocol", August 1993, | Protocol", August 1993, | |||
<http://ftp.cerias.purdue.edu/pub/papers/christoph-schuba/ | <http://ftp.cerias.purdue.edu/pub/papers/christoph-schuba/ | |||
schuba-DNS-msthesis.pdf>. | schuba-DNS-msthesis.pdf>. | |||
[Shostack2014] | [Shostack2014] | |||
Shostack, A., "Threat Modeling: Designing for Security", | Shostack, A., "Threat Modeling: Designing for Security", | |||
End of changes. 4 change blocks. | ||||
4 lines changed or deleted | 4 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |