On 7/28/2016 12:57 PM, Olle E. Johansson wrote:
>> All you can do is cause them visibly break so you can detect and
>> > eradicate them.
> If you check the paper I referred to they have detected the presence 
> of TCP proxys, which may help us with setting protocol options
> right in order to work. Or just fail.
My point is that this logic is backwards.

The order of TCP options is whatever TCP wants them to be at the
endpoints. It should NEVER be constrained by these devices, which are
already clearly violating spec.

I don't want everyone's TCP to "just fail" when it hits these boxes -
perhaps it would be useful to create a custom TCP that can be used to
find these boxes, but once they're found we need to point them out and
demand they be removed (if you're paying for "Internet" behind such a
box, you might have the right to make such a demand).

I.e., we should NEVER use these boxes to govern how we build TCP for the
masses.

Joe

Reply via email to