On 24/02/2021 22:30, David Sommerseth wrote:

TFO has a bigger advantage in short-lived TCP sessions (like web browsers) where you open several independent TCP connections to fetch data in parallel and then close them down.  Here TFO will have an edge.

Agreed.


Now you might argue about the crypto part in the TFO SYN cookies, but that is entirely handled by the kernel and TCP stack - nothing OpenVPN (or any other application) will need to or can care about.

Agreed.

My idea (as daft as it is) would only serve one purpose: To hide a listening TCP port. Because there would be no SYN-ACK from the server if the SYN failed security checks.

I do understand that designing the internet protocols is far more complex than I realise and also under taken by people with far greater knowledge than myself.

But as TFO is allowing data in the SYN packet, if the kernel were to take this one step further and deliver that data directly to the application (upon request of an "Extended TCO Socket" TM) then the application could verify the connection attempt immediately and signal that to the kernel ...

I know, in the big picture, this would really not achieve anything particularly worth while. It was just a thought :)

Regards


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to