FCC & Internet phones

Gary Howland gary at kampai.euronet.nl
Tue Mar 12 05:39:54 PST 1996


-----BEGIN PGP SIGNED MESSAGE-----

Adam Shostack wrote:
> Loren James Rittle wrote:
> | >Most
> | >presumably use a mix of a UDP data connection and tcp for control
> | >functions.
> |
> | OK, everything after the IP header is encrypted.  I don't even know
> | which protocol is in use.
> 
>         Are you willing to play Mallet?  Drop IP packets, and look for
> duplicates.  Those are TCP.  (IPSEC might handle this, but I bet there
> will be broken implementations that save time by resending.)

Are you saying UDP protocols don't retransmit un-acked packets?
If not, then you can't be sure the duplicates are TCP.


Gary
- --
pub  1024/C001D00D 1996/01/22  Gary Howland <gary at kampai.euronet.nl>
Key fingerprint =  0C FB 60 61 4D 3B 24 7D  1C 89 1D BE 1F EE 09 06 

- ---
[This message has been signed by an auto-signing service.  A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Gratis auto-signing service

iQBFAwUBMUVWwioZzwIn1bdtAQHQaAGA1EjYZpEKrie9t/eIohlrHCC4rUY8Dzu1
HgB+1ZbAS8X7hIRb3eSHLlBB13LZtkDH
=4Tgg
-----END PGP SIGNATURE-----






More information about the cypherpunks-legacy mailing list