[e2e] TCP spoofing in overlay networks

Joe Touch touch at ISI.EDU
Wed Mar 2 15:07:08 PST 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Jonathan Shapiro wrote:
| I recently had occaision to read a few papers about the practice of "TCP
| spoofing" over satellite links---i.e inserting a proxy prior to the
| satellite link to provide TCP feedback to the sender, effectively
| splitting into two TCP sessions connected in tandem. I was wondering if
| anyone had ever proposed a similar idea to improve TCP throughput in
| overlay networks over terestrial links.
|
| /jonathan shapiro

TCP 'spoofing' of this sort is basically what TCP Splicing does; there
are numerous problems with this - notably that it breaks the E2E utility
of TCP (getting an ACK doesn't mean the other end got the data!), as
well as challenges when the window sizes of the two TCPs differ.

As to whether this is an overlay or not, I don't see how 'overlay'
related. You're just spoofing a TCP connection; overlays (IMO) are
defined by tunnels. There's no tunnel here (unless you're saying you're
tunneling over TCP, which is a bad idea for numerous other reasons).

Joe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCJkcbE5f5cImnZrsRAixXAKDacJIxg0KtQ6lwTxlAWzi2KcyKVgCfUREU
QXTpT/mYDk1+GXClSwCCylw=
=tSYO
-----END PGP SIGNATURE-----


More information about the end2end-interest mailing list