On Mon, Jul 28, 2014 at 08:57:10AM +0200, marcelo bagnulo braun wrote: > One of them is whether to protect or not the TCP header.
Yes. At least the RST flag. > I would like to start the discussion on this topic. Arguments on one way > or the other? I'd like to be able to know that a RST was generated by the remote peer, and not simply spoofed by a middlebox. If the middlebox wants to break the connection, it can do so by blackholing (and maybe ICMP unreachable) the traffic after it decides the connection should be dropped. At least that way, the two scenarios are distinguishable. .pdf _______________________________________________ Tcpinc mailing list [email protected] https://www.ietf.org/mailman/listinfo/tcpinc
