Re: TCP end-to-end Semantics

From: Joe Touch ([email protected])
Date: Tue Jan 09 2001 - 12:46:37 EST

  • Next message: Joe Touch: "Re: TCP end-to-end Semantics"

    [email protected] wrote:
    >
    > Can somebody come up with some examples of practical, relevant applications
    > that will fail under spoofing?

    What about any connection whose spoofed ACKs cause the sender's window to
    reuse offsets (i.e., roll-around), and then has a change in the
    path that causes the spoofer (with its state) to be outside the path?

    The result will _look_ like a successful transfer, but result
    in corruption.

    Joe



    This archive was generated by hypermail 2b29 : Tue Jan 09 2001 - 13:27:16 EST