|
TCP Cookie Transactions (TCPCT) is specified in RFC 6013 (experimental status) as an extension of Transmission Control Protocol (TCP) intended to secure it against denial-of-service attacks, such as resource exhaustion by SYN flooding and malicious connection termination by third parties. Unlike the original SYN cookies approach,〔(【引用サイトリンク】author=Daniel J. Bernstein )〕 TCPCT does not conflict with other TCP extensions, but requires TCPCT support in the client (initiator) as well as the server (responder) TCP stack. The immediate reason for the TCPCT extension is deployment of the DNSSEC protocol. Prior to DNSSEC, DNS requests primarily used short UDP packets, but due to the size of DNSSEC exchanges, and shortcomings of IP fragmentation, UDP is less practical for DNSSEC.〔B. Carpenter and S. Brim, “Middleboxes: Taxonomy and Issues,” RFC 3234, February 2002.〕〔P. Srisuresh and K. Egevang, “Traditional IP Network Address Translator (Traditional NAT),” RFC 3022, January 2001〕 Thus DNSSEC-enabled requests create a large number of short-lived TCP connections.〔 TCPCT avoids resource exhaustion on server-side by not allocating ''any'' resources until the completion of the three-way handshake. Additionally, TCPCT allows the server to release memory immediately after the connection closes, while it persists in the TIME-WAIT state.〔 TCPCT support was partly merged into the Linux kernel in December 2009,〔http://kernelnewbies.org/Linux_2_6_33#head-2c3c3a8cb87d5b7a6f1182e418abf071cda22c8c〕 but was removed in May 2013 because it was never fully implemented and had a performance cost. == See also == * SYN cookies * T/TCP (Transactional TCP) * TCP Fast Open 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「TCP Cookie Transactions」の詳細全文を読む スポンサード リンク
|