You can check out:
http://www.isr.umd.edu/TechReports/CSHCN/1999/CSHCN_TR_99-11/CSHCN_TR_99-11.pdf
I believe this implementation had a way of maintaining seq numbers
such that they would work even if some traffic was 
routed around the spoofer. but I'm not sure....
Maybe if the original authors are still on this list they can comment...
manish
On Wed, 10 Jan 2001 [email protected] wrote:
> Hi,
> 
> The requirement is that a TCP session, once it starts in spoofed mode
> continues thenceforth in spoofing mode unless there is a graceful
> closure. A route change that causes one of the spoofers to be removed
> from the path, will not be tolerated by most spoofers that I know of.
> However, this isn't as severe a restriction as it sounds.....most
> spoofers that I know operate on access networks where there is only
> one point of attachment.
> 
> It would be interesting if there has been any study on spoofers that
> do tolerate these route changes. What about snoopers, or soft-state
> spoofers? Do they suffer from the same problem?
> 
> -very best regards,
> Abheek
This archive was generated by hypermail 2b29 : Wed Jan 10 2001 - 10:37:10 EST