Fact-checked by Grok 2 weeks ago
References
- [1]
-
[2]
RFC 791: Internet Protocol### Summary of RFC 791: Mention of Robustness Principle
- [3]
-
[4]
The Robustness Principle ReconsideredAug 1, 2011 · The intent of the Robustness Principle was to maximize interoperability between network service implementations, particularly in the face of ambiguous or ...
-
[5]
RFC 9413 - Maintaining Robust Protocols - IETF DatatrackerRFC 9413. Maintaining Robust Protocols. Abstract. The main goal of the networking standards process is to enable the long-term interoperability of protocols ...Missing: computer | Show results with:computer
- [6]
- [7]
-
[8]
RFC 1122: Requirements for Internet Hosts - Communication LayersSummary of each segment:
-
[9]
RFC 760 - DoD standard Internet Protocol - IETF DatatrackerAuthors. Last updated, 2013-03-02. RFC stream, Legacy ... Jon Postel Editor [Page iii] January 1980 RFC: 760 IEN: 128 Replaces: IENs 123, 111, 80, 54, 44, ...
-
[10]
Jon Postel - Internet Hall of FameFor almost three decades, Jon Postel was RFC Editor, shepherding drafts through the open consensus processes that characterize Internet development efforts.Missing: 760 author
- [11]
-
[12]
RFC 2468: I REMEMBER IANAJon, our beloved IANA, is gone. Even as I write these words I cannot quite grasp this stark fact. We had almost lost him once before in 1991.Missing: 1978-1998 | Show results with:1978-1998
-
[13]
RFC 760 - DoD standard Internet Protocol - IETF DatatrackerRFC: 760 IEN: 128 DOD STANDARD INTERNET PROTOCOL January 1980 prepared for Defense Advanced Research Projects Agency Information Processing Techniques ...
- [14]
-
[15]
The Robustness Principle Reconsidered - ACM QueueJun 22, 2011 · The intent of the Robustness Principle was to maximize interoperability between network service implementations, particularly in the face of ambiguous or ...Seeking A Middle Ground · Standards And... · Ambiguity And Extensibility...
- [16]
-
[17]
RFC 768 - User Datagram Protocol - IETF DatatrackerThis User Datagram Protocol (UDP) is defined to make available a datagram mode of packet-switched computer communication in the environment of an ...
-
[18]
RFC 1035: Domain names - implementation and specificationSummary of each segment:
-
[19]
RFC 4271: A Border Gateway Protocol 4 (BGP-4)Summary of each segment:
- [20]
- [21]
- [22]
-
[23]
Deserialization Features · FasterXML/jackson-databind Wiki - GitHubJackson defines a set of features that relate to deserialization (reading JSON into Java Objects), and that can be changed on per-call basis, by using ...Missing: tolerant robustness principle
- [24]
- [25]
-
[26]
RFC 2145 - IETFRFC791 [4] defines the "robustness principle" in section 3.2: an implementation must be conservative in its sending behavior, and liberal in its receiving ...
-
[27]
RFC 5321: Simple Mail Transfer ProtocolSummary of each segment:
-
[28]
RFC 1122: Requirements for Internet Hosts - Communication LayersSummary of each segment:
-
[29]
[PDF] A Patch for Postel's Robustness Principle - LangSecJon Postel's Robustness Prin- ciple—“Be conservative in what you do, and liberal in what you accept from others”—played a fundamental role in how Inter-.<|control11|><|separator|>
-
[30]
[PDF] Scalable Graceful Degradation for Distributed Embedded SystemsA gracefully degrading system tolerates partial system failures by providing reduced functionality with the remaining available system resources. In general, ...
-
[31]
RFC 9413: Maintaining Robust Protocols... robustness principle, often phrased as "be conservative in what you send, and liberal in what you accept", has long guided the design and implementation of ...
-
[32]
The Harmful Consequences of the Robustness Principle - IETFJul 12, 2021 · The robustness principle, often phrased as "be conservative in what you send, and liberal in what you accept", has long guided the design ...
-
[33]
CVE-2004-0597 - NVDMultiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images.
-
[34]
[PDF] [PDF Ambiguity and Obfuscation]Mar 31, 2010 · So what's going on? • Postel's Law: "be conservative in what you do, be liberal in what you accept from others".
-
[35]
CRLF Injection - OWASP FoundationA CRLF Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
-
[36]
RFC 6891 - Extension Mechanisms for DNS (EDNS(0))This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several ...Missing: amplification | Show results with:amplification
-
[37]
[PDF] Paul Vixie Whitepaper - DefconInternet's “dumb core, smart edge” model and Postel's law (“be conservative in what you do, be liberal in what you accept from others”). Reflective and ...