2012
DOI: 10.1109/msp.2012.31
|View full text |Cite
|
Sign up to set email alerts
|

A Patch for Postel's Robustness Principle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…Postel's Law, also known as the Robustness Principle, refers to the implementation of protocols and states that one should strictly adhere to the standards when sending, but be liberal in what to accept when receiving [30]. While the benefits of this approach are obvious, numerous discussions have revealed significant issues for the Internet ecosystem caused by following this rule [31], [32]. So far security considerations primarily criticized the increased complexity of liberal implementations, which in turn increases the potential for introducing bugs.…”
Section: Discussionmentioning
confidence: 99%
“…Postel's Law, also known as the Robustness Principle, refers to the implementation of protocols and states that one should strictly adhere to the standards when sending, but be liberal in what to accept when receiving [30]. While the benefits of this approach are obvious, numerous discussions have revealed significant issues for the Internet ecosystem caused by following this rule [31], [32]. So far security considerations primarily criticized the increased complexity of liberal implementations, which in turn increases the potential for introducing bugs.…”
Section: Discussionmentioning
confidence: 99%
“…As has been noted many times before [34], [35], it may be time to deprecate Postel's Law -'Be conservative in what you send, be liberal in what you accept' -, which was introduced in times when security was less of a concern, and also be conservative in what an implementation accepts.…”
Section: Discussionmentioning
confidence: 99%
“…10,11,25,26 While the best-known evasion techniques are from network and transport layers, other protocols can also be used. 10 Evasions exploit the fact that all received traffic is interpreted and that an IPS may interpret it differently from the end system.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…Attackers may freely craft the network traffic without following the correct protocol semantics. 10,11,25,26 While the best-known evasion techniques are from network and transport layers, other protocols can also be used. Evasions are possible at every OSI layer.…”
Section: Evasion Techniquesmentioning
confidence: 99%