1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725
|
<pre>Network Working Group L. Coene
Request for Comments: 3257 Siemens
Category: Informational April 2002
<span class="h1">Stream Control Transmission Protocol Applicability Statement</span>
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2002). All Rights Reserved.
Abstract
This document describes the applicability of the Stream Control
Transmission Protocol (SCTP). It also contrasts SCTP with the two
dominant transport protocols, User Datagram Protocol (UDP) &
Transmission Control Protocol (TCP), and gives some guidelines for
when best to use SCTP and when not best to use SCTP.
Table of contents
<a href="#section-1">1</a>. Introduction .................................................. <a href="#page-2">2</a>
<a href="#section-1.1">1.1</a> Terminology .................................................. <a href="#page-2">2</a>
<a href="#section-2">2</a> Transport protocols ............................................ <a href="#page-2">2</a>
<a href="#section-2.1">2.1</a> TCP service model ............................................ <a href="#page-2">2</a>
<a href="#section-2.2">2.2</a> SCTP service model ........................................... <a href="#page-3">3</a>
<a href="#section-2.3">2.3</a> UDP service model ............................................ <a href="#page-4">4</a>
<a href="#section-3">3</a> SCTP Multihoming issues ........................................ <a href="#page-4">4</a>
<a href="#section-4">4</a> SCTP Network Address Translators (NAT) issues [<a href="./rfc2663" title=""IP Network Address Translator (NAT) Terminology and Considerations"">RFC2663</a>] ........ <a href="#page-5">5</a>
<a href="#section-5">5</a> Security Considerations ........................................ <a href="#page-6">6</a>
<a href="#section-5.1">5.1</a> Security issues with TCP ..................................... <a href="#page-6">6</a>
<a href="#section-5.2">5.2</a> Security issues with SCTP .................................... <a href="#page-7">7</a>
<a href="#section-5.3">5.3</a> Security issues with both TCP and SCTP ....................... <a href="#page-8">8</a>
<a href="#section-6">6</a> References and related work .................................... <a href="#page-9">9</a>
<a href="#section-7">7</a> Acknowledgments ................................................ <a href="#page-10">10</a>
<a href="#appendix-A">Appendix A</a>: Major functions provided by SCTP ..................... <a href="#page-11">11</a>
Editor's Address ................................................. <a href="#page-12">12</a>
Full Copyright Statement ......................................... <a href="#page-13">13</a>
<span class="grey">Coene Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a> Introduction</span>
SCTP is a reliable transport protocol [<a href="./rfc2960" title=""Stream Control Transmission Protocol"">RFC2960</a>], which along with TCP
[<a href="./rfc793" title=""Transmission Control Protocol"">RFC793</a>], RTP [<a href="./rfc1889" title=""RTP: A Transport Protocol for Real-Time Applications"">RFC1889</a>], and UDP [<a href="./rfc768" title=""User Datagram Protocol"">RFC768</a>], provides transport-layer
services for upper layer protocols and services. UDP, RTP, TCP, and
SCTP are currently the IETF standards-track transport-layer
protocols. Each protocol has a domain of applicability and services
it provides, albeit with some overlaps.
By clarifying the situations where the functionality of these
protocols are applicable, this document can guide implementers and
protocol designers in selecting which protocol to use.
Special attention is given to services SCTP provides which would make
a decision to use SCTP the right one.
Major functions provided by SCTP can be found in <a href="#appendix-A">Appendix A</a>.
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a> Terminology</span>
The following terms are commonly identified in this work:
Association: SCTP connection between two endpoints.
Transport address: A combination of IP address and SCTP port number.
Upper layer: The user of the SCTP protocol, which may be an
adaptation layer, a session layer protocol, or the user application
directly.
Multihoming: Assigning more than one IP network interface to a single
endpoint.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a> Transport protocols</span>
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a> TCP service model</span>
TCP is a connection-oriented (a.k.a., session-oriented) transport
protocol. This means that it requires both the establishment of a
connection prior to the exchange of application data and a connection
tear-down to release system resources after the completion of data
transfer.
TCP is currently the most widely used connection-oriented transport
protocol for the Internet.
<span class="grey">Coene Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
TCP provides the upper layer with the following transport services:
- data reliability;
- data sequence preservation; and
- flow and congestion control.
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a> SCTP service model</span>
SCTP is also connection-oriented and provides all the transport
services that TCP provides. Many Internet applications therefore
should find that either TCP or SCTP will meet their transport
requirements. Note, for applications conscious about processing
cost, there might be a difference in processing cost associated with
running SCTP with only a single ordered stream and one address pair
in comparison to running TCP.
However, SCTP has some additional capabilities that TCP lacks and
This can make SCTP a better choice for some applications and
environments:
- multi-streams support:
SCTP supports the delivery of multiple independent user message
streams within a single SCTP association. This capability, when
properly used, can alleviate the so-called head-of-line-blocking
problem caused by the strict sequence delivery constraint imposed to
the user data by TCP.
This can be particularly useful for applications that need to
exchange multiple, logically separate message streams between two
endpoints.
- multi-homing support:
SCTP provides transparent support for communications between two
endpoints of which one or both is multi-homed.
SCTP provides monitoring of the reachability of the addresses on the
remote endpoint and in the case of failure can transparently failover
from the primary address to an alternate address, without upper layer
intervention.
<span class="grey">Coene Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
This capability can be used to build redundant paths between two SCTP
endpoints and can be particularly useful for applications that seek
transport-level fault tolerance.
Achieving path redundancy between two SCTP endpoints normally
requires that the two endpoints being equipped with multiple
interfaces assigned with multiple addresses and that routing is
configured appropriately (see <a href="#section-3">Section 3</a>).
- preservation of message boundaries:
SCTP preserves application messages boundaries. This is useful when
the application data is not a continuous byte stream but comes in
logical chunks that the receiver handles separately.
In contrast, TCP offers a reliable data stream that has no indication
of what an application may consider logical chunks of the data.
- unordered reliable message delivery:
SCTP supports the transportation of user messages that have no
application-specified order, yet need guaranteed reliable delivery.
Applications that need to send un-ordered reliable messages or prefer
using their own message sequencing and ordering mechanisms may find
this SCTP capability useful.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a> UDP Service model</span>
UDP is connectionless. This means that applications that use UDP do
not need to perform connection establishment or tear-down.
As transport services to its upper layer, UDP provides only:
- best-effort data delivery, and
- preservation of message boundaries.
Applications that do not require a reliable transfer of more than a
packet's worth of data will find UDP adequate. Some transaction-
based applications fall into this category.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a> SCTP Multihoming Issues</span>
SCTP provides transport-layer support for multihoming. Multihoming
has the potential of providing additional robustness against network
failures. In some applications, this may be extremely important, for
example, in signaling transport of PSTN signaling messages [<a href="./rfc2719" title=""Architectural Framework for Signaling Transport"">RFC2719</a>].
<span class="grey">Coene Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
It should be noted that SCTP multihoming support only deals with
communication between two endpoints of which one or both is assigned
with multiple IP addresses on possibly multiple network interfaces.
It does NOT deal with communication ends that contain multiple
endpoints (i.e., clustered endpoints) that can switch over to an
alternate endpoint in case of failure of the original endpoint.
Generally, for truly fault resilient communication between two end-
points, the multihoming feature needs more than one IP network
interface for each endpoint. The number of paths used is the minimum
of network interfaces used by any of the endpoints. When an endpoint
selects its source address, careful consideration must be taken. If
the same source address is always used, then it is possible that the
endpoint will be subject to the same single point of failure. When
the endpoint chooses a source address, it should always select the
source address of the packet to correspond to the IP address of the
Network interface where the packet will be emitted subject to the
binding address constraint. The binding address constraint is, put
simply, that the endpoint must never choose a source address that is
not part of the association i.e., the peer endpoint must recognize
any source address used as being part of the association.
The availability of the association will benefit greatly from having
multiple addresses bound to the association endpoint when the
endpoint is on a multi-homed host.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a> SCTP Network Address Translators (NAT) issues [<a href="./rfc2663" title=""IP Network Address Translator (NAT) Terminology and Considerations"">RFC2663</a>]</span>
When two endpoints are to setup an SCTP association and one (or both)
of them is behind a NAT (i.e., it does not have any publicly
available network addresses), the endpoint(s) behind the NAT should
consider one of the following options:
(1) When single homed sessions are to be used, no transport addresses
should be sent in the INIT or INIT ACK chunk(Refer to <a href="./rfc2960#section-3.3">section 3.3 of
RFC2960</a> for chunk definitions). This will force the endpoint that
receives this initiation message to use the source address in the IP
header as the only destination address for this association. This
method can be used for a NAT, but any multi-homing configuration at
the endpoint that is behind the NAT will not be visible to its peer,
and thus not be taken advantage of. See figure 1.
<span class="grey">Coene Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
+-------+ +---------+ *~~~~~~~~~~* +------+
|Host A | | NAT | * Cloud * |Host B|
| 10.2 +--|10.1|2.1 |----|--------------|---------+ 1.2 |
| | | | | * * | |
+-------+ +---------+ *~~~~~~~~~~* +------+
Fig 1: SCTP through NAT without multihoming
For multihoming the NAT must have a public IP address for each
represented internal IP address. The host can preconfigure an IP
address that the NAT can substitute, or, the NAT can have internal
Application Layer Gateway (ALG) which will intelligently translate
the IP addresses in the INIT and INIT ACK chunks. See Figure 2.
If Network Address Port Translation is used with a multihomed SCTP
endpoint, then any port translation must be applied on a per-
association basis such that an SCTP endpoint continues to receive the
same port number for all messages within a given association.
+-------+ +----------+ *~~~~~~~~~~* +------+
|Host A | | NAT | * Cloud * |Host B|
| 10.2 +---+ 10.1|5.2 +-----+ 1.1<+->3.1--+---------+ 1.2 |
| 11.2 +---+ 11.1|6.2 | | +->4.2--+---------+ 2.2 |
| | | | * * | |
+-------+ +----------+ *~~~~~~~~~* +------+
Fig 2: SCTP through NAT with multihoming
(2) Another alternative is to use the hostname feature and DNS to
resolve the addresses. The hostname is included in the INIT of the
association or in the INIT ACK. The hostname must be resolved by DNS
before the association is completely set up. There are special
issues regarding NAT and DNS, refer to <a href="./rfc2694">RFC2694</a> for details.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a> Security Considerations</span>
In this section, some relevant security issues found in the
deployment of the connection-oriented transport protocols will be
discussed.
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a> Security issues with TCP</span>
Some TCP implementations have been known to be vulnerable to blind
denial of service attacks, i.e., attacks that had been executed by an
attacker that could not see most of the traffic to or from the target
host.
<span class="grey">Coene Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
The attacker would send a large number of connection establishment
requests (TCP-SYN packets) to the attacked target, possibly from
faked IP source addresses. The attacked host would reply by sending
SYN-ACK packets and entering SYN-received state, thereby allocating
space for a TCB. At some point the SYN-queue would fill up, (i.e.,
the number of connections waiting to be established would rise to a
limit) and the host under attack would have to start turning down new
connection establishment requests.
TCP implementations with SYN-cookies algorithm [SYN-COOK] reduce the
risk of such blind denial of service attacks. TCP implementations
can switch to using this algorithm in times when their SYN-queues are
filled up while still fully conforming to the TCP specification
[<a href="./rfc793" title=""Transmission Control Protocol"">RFC793</a>]. However, use of options such as a window scale [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>],
is not possible, then. With the SYN-cookie mechanism, a TCB is only
created when the client sends back a valid ACK packet to the server,
and the 3-way handshake has thus been successfully completed.
Blind connection forgery is another potential threat to TCP. By
guessing valid sequence numbers, an attacker would be able to forge a
connection. However, with a secure hashsum algorithm, for some of
the current SYN-cookie implementations the likelihood of achieving
this attack is on the order of magnitude of 1 in 2^24, i.e., the
attacker would have to send 2^24 packets before obtaining one forged
connection when SYN-cookies are used.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a> Security issues with SCTP</span>
SCTP has been designed with the experiences made with TCP in mind.
To make it hard for blind attackers (i.e., attackers that are not
man-in-the-middle) to inject forged SCTP datagrams into existing
associations, each side of an SCTP association uses a 32 bit value
called "Verification Tag" to ensure that a datagram really belongs to
the existing association. So in addition to a combination of source
and destination transport addresses that belong to an established
association, a valid SCTP datagram must also have the correct tag to
be accepted by the recipient.
Unlike in TCP, usage of cookie in association establishment is made
mandatory in SCTP. For the server, a new association is fully
established after three messages (containing INIT, INIT-ACK, COOKIE-
ECHO chunks) have been exchanged. The cookie is a variable length
parameter that contains all relevant data to initialize the TCB on
the server side, plus a HMAC used to secure it. This HMAC (MD5 as
per [<a href="./rfc1321" title=""The MD5 Message-Digest Algorithm"">RFC1321</a>] or SHA-1 [<a href="#ref-SHA1" title=""Secure Hash Standard,"">SHA1</a>]) is computed over the cookie and a
secret, server-owned key.
<span class="grey">Coene Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
As specifically prescribed for SCTP implementations [<a href="./rfc2960" title=""Stream Control Transmission Protocol"">RFC2960</a>],
additional resources for new associations may only be reserved in
case a valid COOKIE-ECHO chunk is received by a client, and the
computed HMAC for this new cookie matches that contained in the
cookie.
With SCTP the chances of an attacker being able to blindly forge a
connection are even lower than in the case of TCP using SYN-cookies,
since the attacker would have to guess a correct value for the HMAC
contained in the cookie, i.e., lower than 1 in 2^128 which for all
practical purposes is negligible.
It should be noted that SCTP only tries to increase the availability
of a network. SCTP does not contain any protocol mechanisms that are
directly related to user message authentication, integrity and
confidentiality functions. For such features, it depends on the
IPsec protocols and architecture and/or on security features of the
application protocols.
Transport Layer security(TLS)[<a href="./rfc2246" title=""The TLS Protocol Version 1.0"">RFC2246</a>] using SCTP must always use
in-order streams.
Currently the IPSEC working group is investigating the support of
multi-homing by IPSEC protocols. At the present time to use IPSEC,
one must use 2 * N * M security associations if one endpoint uses N
addresses and the other M addresses.
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a> Security Issues with both TCP and SCTP</span>
It is important to note that neither TCP nor SCTP protect itself from
man-in-the-middle attacks where an established session might be
hijacked (assuming the attacker can see the traffic from and inject
its own packets to either endpoints).
Also, to prevent blind connection/session setup forgery, both TCP
implementations supporting SYN-cookies and SCTP implementations rely
on a server-known, secret key to protect the HMAC data. It must be
ensured that this key is created subject to the recommendations
mentioned in [<a href="./rfc1750" title=""Randomness Recommendations for Security"">RFC1750</a>].
Although SCTP has been designed carefully as to avoid some of the
problems that have appeared with TCP, it has as of yet not been
widely deployed. It is therefore possible that new security issues
will be identified that will have to be addressed in further
revisions of [<a href="./rfc2960" title=""Stream Control Transmission Protocol"">RFC2960</a>].
<span class="grey">Coene Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a> References and related work</span>
[<a id="ref-RFC2960">RFC2960</a>] Stewart, R., Xie, Q., Morneault, K., Sharp, C.,
Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, M.,
Zhang, L. and V. Paxson, "Stream Control Transmission
Protocol", <a href="./rfc2960">RFC 2960</a>, October 2000.
[<a id="ref-RFC2401">RFC2401</a>] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", <a href="./rfc2401">RFC 2401</a>, November 1998.
[<a id="ref-RFC2663">RFC2663</a>] Srisuresh, P. and M. Holdrege, "IP Network Address
Translator (NAT) Terminology and Considerations", <a href="./rfc2663">RFC</a>
<a href="./rfc2663">2663</a>, August 1999.
[<a id="ref-RFC2694">RFC2694</a>] Srisuresh, P., Tsirtsis, G., Akkiraju, P. and A.
Heffernan, "DNS extensions to Network Address Translators
(DNS_ALG)", <a href="./rfc2694">RFC 2694</a>, September 1999.
[<a id="ref-RFC768">RFC768</a>] Postel, J., "User Datagram Protocol", STD 6, <a href="./rfc768">RFC 768</a>,
August 1980.
[<a id="ref-RFC793">RFC793</a>] Postel, J., "Transmission Control Protocol", STD 7, <a href="./rfc793">RFC</a>
<a href="./rfc793">793</a>, September 1981.
[<a id="ref-RFC2719">RFC2719</a>] Ong, L., Rytina, I., Garcia, M., Schwarzbauer, H., Coene,
L., Lin, H., Juhasz, I., Holdrege, M. and C. Sharp,
"Architectural Framework for Signaling Transport", <a href="./rfc2719">RFC</a>
<a href="./rfc2719">2719</a>, October 1999.
[<a id="ref-RFC1321">RFC1321</a>] Rivest, R., "The MD5 Message-Digest Algorithm", <a href="./rfc1321">RFC 1321</a>,
April 1992.
[<a id="ref-RFC1323">RFC1323</a>] Jacobson, V., Braden, R. and D. Borman, "TCP Extensions
for High Performance", <a href="./rfc1323">RFC 1323</a>, May 1992.
[<a id="ref-RFC1750">RFC1750</a>] Eastlake, D., Crocker, S. and J. Schiller, "Randomness
Recommendations for Security", <a href="./rfc1750">RFC 1750</a>, December 1994.
[<a id="ref-SHA1">SHA1</a>] NIST FIPS PUB 180-1, "Secure Hash Standard," National
Institute of Standards and Technology, U.S. Department of
Commerce, April 1995.
[<a id="ref-SYNCOOK">SYNCOOK</a>] Dan J. Bernstein, SYN cookies, 1997, see also
<<a href="http://cr.yp.to/syncookies.html">http://cr.yp.to/syncookies.html</a>>
[<a id="ref-RFC2246">RFC2246</a>] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0",
<a href="./rfc2246">RFC 2246</a>, January 1999.
<span class="grey">Coene Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
[<a id="ref-RFC1889">RFC1889</a>] Schulzrinne, H., Casner, S., Frederick, R. and V.
Jacobson, "RTP: A Transport Protocol for Real-Time
Applications", <a href="./rfc1889">RFC 1889</a>, January 1996.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a> Acknowledgments</span>
This document was initially developed by a design team consisting of
Lode Coene, John Loughney, Michel Tuexen, Randall R. Stewart,
Qiaobing Xie, Matt Holdrege, Maria-Carmen Belinchon, Andreas
Jungmaier, Gery Verwimp and Lyndon Ong.
The authors wish to thank Renee Revis, I. Rytina, H.J. Schwarzbauer,
J.P. Martin-Flatin, T. Taylor, G. Sidebottom, K. Morneault, T.
George, M. Stillman, N. Makinae, S. Bradner, A. Mankin, G. Camarillo,
H. Schulzrinne, R. Kantola, J. Rosenberg, R.J. Atkinson, and many
others for their invaluable comments.
<span class="grey">Coene Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
Appendix A: Major functions provided by SCTP
- Reliable Data Transfer
- Multiple streams to help avoid head-of-line blocking
- Ordered and unordered data delivery on a per-stream basis
- Bundling and fragmentation of user data
- TCP friendly Congestion and flow control
- Support continuous monitoring of reachability
- Graceful termination of association
- Support of multi-homing for added reliability
- Some protection against blind denial-of-service attacks
- Some protection against blind masquerade attacks
<span class="grey">Coene Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a> Editor's Address</span>
Lode Coene
Siemens Atea
Atealaan 34
B-2200 Herentals
Belgium
Phone: +32-14-252081
EMail: lode.coene@siemens.atea.be
<span class="grey">Coene Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc3257">RFC 3257</a> SCTP Applicability Statement April 2002</span>
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Full Copyright Statement</span>
Copyright (C) The Internet Society (2002). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Coene Informational [Page 13]
</pre>
|