[52019] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: FCC & Internet phones

daemon@ATHENA.MIT.EDU (Adam Shostack)
Tue Mar 12 10:08:34 1996

From: Adam Shostack <adam@homeport.org>
To: gary@kampai.euronet.nl (Gary Howland)
Date: Tue, 12 Mar 1996 09:32:58 -0500 (EST)
Cc: cypherpunks@toad.com
In-Reply-To: <199603121049.FAA20806@bb.hks.net> from "Gary Howland" at Mar 12, 96 05:49:40 am

Gary Howland wrote:

| Adam Shostack wrote:
| > Loren James Rittle wrote:
| > | >Most
| > | >presumably use a mix of a UDP data connection and tcp for control
| > | >functions.
| > |
| > | OK, everything after the IP header is encrypted.  I don't even know
| > | which protocol is in use.
| >
| >         Are you willing to play Mallet?  Drop IP packets, and look for
| > duplicates.  Those are TCP.  (IPSEC might handle this, but I bet there
| > will be broken implementations that save time by resending.)
| 
| Are you saying UDP protocols don't retransmit un-acked packets?
| If not, then you can't be sure the duplicates are TCP.

Err, yes.  Thats the point of UDP; its unreliable and has no
acknowweldgement.

"The User Datagram Protocol uses the underlying Internet Protocol to
transport a message from one machine to another, and provides the same
unreliable, connectionless datagram delivery semantics as IP."
(Comer, 11.3)

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post