Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
12Activity
×

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Security Assessment of the Internet Protocol

Security Assessment of the Internet Protocol

Ratings:

5.0

(2)
|Views: 3,992|Likes:
Published by Chris Nash
The TCP/IP protocols were conceived during a time that was quite different from the
hostile environment they operate in now. Yet a direct result of their effectiveness and
widespread early adoption is that much of today’s global economy remains dependent
upon them.
The TCP/IP protocols were conceived during a time that was quite different from the
hostile environment they operate in now. Yet a direct result of their effectiveness and
widespread early adoption is that much of today’s global economy remains dependent
upon them.

More info:

Categories:Types, School Work
Published by: Chris Nash on Aug 20, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

06/10/2013

pdf

text

original

 
Security ASSeSSmentof the internet Protocol
july 2008
 
Written by Fernando Gont on behalf of CPNI.
Disclaimer
Reference to any specic commercial product, process or service by trade name, trademark manufacturer, or otherwise,does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authorsexpressed within this document shall not be used for advertising or product endorsement purposes. To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect orconsequential and including, but not limited to, loss of prots or anticipated prots, loss of data, business or goodwill)incurred by any person and howsoever caused arising from or connected with any error or omission in this documentor from any person acting, omitting to act or refraining form acting upon, or otherwise using, the information containedin this document or its references. You should make your own judgement as regards to use of this document and seek independent professional advice on your particular circumstances.
 
www.cpni.gov.uk 
 
Security Assessment of the Internet Protocol
Table of Contents
1. Preface ..................................................................................................................................... 3
. Introduction ..................................................................................................................... 3.2 Scope of this document .................................................................................................. 4.3 Organization of this document .........................................................................................4.4 Typographical conventions .............................................................................................. 5.5 Getting the latest version of this document ....................................................................... 5.6 Advice and guidance to vendors ...................................................................................... 5.5 Acknowledgements ......................................................................................................... 5
2. The Internet Protocol .............................................................................................................. 6
3. Internet Protocol header elds
.............................................................................................. 7
3. Version ............................................................................................................................. 73.2 IHL (Internet Header Length) ............................................................................................ 83.3 TOS ................................................................................................................................. 83.4 Total Length ..................................................................................................................... 9
3.5Identication(ID)
............................................................................................................. 03.5. Some workarounds implemented by the industry ........................................................ 03.5.2 Possible security improvements .................................................................................. 3.6 Flags .............................................................................................................................. 33.7 Fragment Offset ............................................................................................................. 43.8 Time to Live (TTL) ........................................................................................................... 53.9 Protocol ......................................................................................................................... 93.0 Header Checksum ....................................................................................................... 93. Source Address ........................................................................................................... 9
3.12DestinationAddress
.....................................................................................................203.3 Options ........................................................................................................................ 203.3. General issues with IP options ................................................................................... 23.3.. Processing requirements ........................................................................................ 23.3..2 Processing of the options by the upper layer protocol ............................................ 223.3..3 General sanity checks on IP options ....................................................................... 22
3.13.2Issueswithspecicoptions
....................................................................................... 233.3.2. End of Option List (Type = 0) .................................................................................. 233.3.2.2 No Operation (Type = ) ......................................................................................... 243.3.2.3 Loose Source Record Route (LSRR) (Type = 3) .................................................. 24

Activity (12)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Michael liked this
GVF liked this
bikramaditya liked this
ximpepe liked this
mns_cali liked this
kathawatess8347 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->