FINDING · DETECTION

An adversary aware of a decoy router's location can force decoy-routed flows to be unprocessable by fragmenting all packets below the size of a complete TCP header in the first fragment, preventing flow assignment and forcing the router into expensive reassembly. Alternatively, the adversary can use small-fragment attacks to grow the router's state table, analogous to NAT resource exhaustion. The paper identifies fragmentation-based denial as a harder-to-mitigate attack class than sentinel replay.

From 2011-karlin-decoyDecoy Routing: Toward Unblockable Internet Communication · §4.2 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blockingmiddlebox-interference
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.