FINDING · DEFENSE

TCP flow hijacking by the decoy proxy is practical under an asymmetric routing assumption: expected sequence numbers are recoverable from ACK values in client-originated packets alone, so the decoy router need not observe return traffic. The proxy forges a TCP RST to the decoy destination and mimics its TCP options (timestamp, window scale, SACK) to reduce detectability; these options are conveyed encrypted inside the sentinel's 28-byte TLS random field.

From 2011-karlin-decoyDecoy Routing: Toward Unblockable Internet Communication · §3.3 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
dpimiddlebox-interference
defenses
decoy-routingmimicry

Extracted by claude-sonnet-4-6 — review before relying.