IP fragmentation attack: Difference between revisions

Content deleted Content added
Sorry! There was 4-bits flag length. Numeric header added.
Grammatical corrections
Line 53:
Because an IP internet can be connectionless, fragments from one datagram may be interleaved with those from another at the destination. The "Identification field" uniquely identifies the fragments of a particular [[datagram]].
 
The source system sets "Identification" field in each datagram to a unique value for all datagrams usingwhich use the same source IP address, destination IP address, and "Protocol" values, for the lifetime of the datagram on the internet. This way the destination can distinguish which incoming fragments belong to a unique datagram and buffer all of them until the last fragment is received. The last fragment sets the "More Fragment" bit to 0 and this tells the receiving station to start reassembling the data if all fragments have been received.
 
The following is a real-life fragmentation example: