{"draft":"","doc_id":"RFC1858","title":" Security Considerations for IP Fragment Filtering ","authors":["G. Ziemba","D. Reed","P. Traina"],"format":["ASCII","HTML"],"page_count":"10","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Legacy","abstract":" IP fragmentation can be used to disguise TCP packets from IP filters used in routers and hosts. This document describes two methods of attack as well as remedies to prevent them. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. ","pub_date":"September 1995","keywords":["internet","protocol","tcp","transmission","control","protocol","routers","hosts"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[" RFC3128"],"see_also":[],"doi":"10.17487\/RFC1858","errata_url":null}