On 7/28/2016 12:57 PM, Olle E. Johansson wrote: >> All you can do is cause them visibly break so you can detect and >> > eradicate them. > If you check the paper I referred to they have detected the presence > of TCP proxys, which may help us with setting protocol options > right in order to work. Or just fail. My point is that this logic is backwards.
The order of TCP options is whatever TCP wants them to be at the endpoints. It should NEVER be constrained by these devices, which are already clearly violating spec. I don't want everyone's TCP to "just fail" when it hits these boxes - perhaps it would be useful to create a custom TCP that can be used to find these boxes, but once they're found we need to point them out and demand they be removed (if you're paying for "Internet" behind such a box, you might have the right to make such a demand). I.e., we should NEVER use these boxes to govern how we build TCP for the masses. Joe
