TapDance's non-blocking asymmetric design leaves the overt connection open but abandoned, enabling an active censor to inject a TCP ACK carrying a stale sequence number; the overt server responds with its true TCP state, exposing the discrepancy and confirming decoy routing. The attack requires no clean-path routing capability: the injected packet is forwarded through the tainted path by the non-blocking TapDance station itself.
From 2016-bocovich-slitheen — Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
· §2.2, §4.3
· 2016
· Computer and Communications Security
Implications
Any decoy routing design that abandons or severs the overt connection after hijacking it is vulnerable to TCP replay; the relay must maintain a live, active TCP session with the overt server for the entire duration of the covert session.
Inline blocking of downstream data—despite its deployment cost—is a prerequisite for defending against TCP state probing attacks.