Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

SCTP (Stream Control Transmission Protocol)

Type
Audio
Tags
network
Authors
Andreas Jungmaier
Event
Chaos Communication Congress 19th (19C3) 2002
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/2002/lectures/19C3-495-sctp.mp3
File name
19C3-495-sctp.mp3
File size
20.4 MB
MD5
e752ba9ce47bf2491c5e1706052982bc
SHA1
db25e8297ab42f768d49c36044d13ebeb1782fa9

The SCTP (Stream Control Transmission Protocol) is a new reliable transfer protocol standardized by the Internet Engineering Task Force (IETF) in the documents [1], [2] and [3]. It was primarily developed by the SIGTRAN group to provide a mechanism for transporting currently circuit switched telephony signaling (SS7) data over packet switched networks. Designed to overcome some deficiencies of TCP, its main benefits are a more flexible, message oriented data delivery to its user, and inherent support for multi-homimng. As such, it is not only a transport protocol for delivery of SS7 signaling data over IP networks, as originally intended. Much rather, it is a general purpose transport protocol, suitable for any kind of message oriented traffic (e.g. Internet file transfer, SCSI over IP, SIP, HTTP, etc.), and thus a successor to TCP. Together with enhancements to the core protocol (as per [4] and [5]), features for mobility of SCTP endpoints and multimedia transmissions can be added to SCTP implementations. So far, major operating systems vendors started integrating SCTP into their protocol stacks, among these Linux, FreeBSD, Solaris, HP-UX, IBM AIX, Cisco IOS, and many more. This presentation will be about the features of the core protocol, and explain the protocol enhancements for transport layer mobility and partial reliability. Security solutions using IPSec or TLS [6] will also be covered.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !