Re: TCP end-to-end Semantics

From: Fred Baker ([email protected])
Date: Tue Jan 09 2001 - 20:09:22 EST

  • Next message: [email protected]: "Re: TCP end-to-end Semantics"

    At 05:51 PM 1/9/01 -0500, Mingyan Liu wrote:
    >it be left to the application/user to decide
    >whether they would rather use the spoofer and be exposed to higher failure
    >probability, or just play safe and bypass the spoofer (assume that the use
    >of a spoofer is not mandatory)?

    In general, I would agree with that. Now tell me this: do you know that the
    spoofer is there? How do you evade it?

    The cases that come quickly to mind are transparent and non-transparent web
    caches, Packeteer-style QoS control boxes which fiddle with TCP headers,
    Arrowpoint-etc devices which front-end sets of web servers, and so on. I
    can get around the non-transparent caches (SQuID etc) readily enough, but I
    may not be able to get around the others, and may not even know they are there.

    In such cases, the statement above is a great sentiment, one I would
    wholeheartedly support, but doesn't seem very practical.



    This archive was generated by hypermail 2b29 : Tue Jan 09 2001 - 21:40:28 EST