TCP flow hijacking by the decoy proxy is practical under an asymmetric routing assumption: expected sequence numbers are recoverable from ACK values in client-originated packets alone, so the decoy router need not observe return traffic. The proxy forges a TCP RST to the decoy destination and mimics its TCP options (timestamp, window scale, SACK) to reduce detectability; these options are conveyed encrypted inside the sentinel's 28-byte TLS random field.
From 2011-karlin-decoy — Decoy Routing: Toward Unblockable Internet Communication
· §3.3
· 2011
· Free and Open Communications on the Internet
Implications
When building session-hijacking infrastructure, design for asymmetric (one-directional) path visibility; recover all needed state from the client half of the flow to avoid depending on return-path access.
Replicate the target server's TCP options in hijacked sessions to avoid statistical distinguishability from normal connections on timing and option-negotiation features.