> This suggests that you have on-path capabilities between each of the > reflectors and the victim, right?
I don't think so: you need the first attacker to get the cookie, then you spread it out. > If you have on-path capabilities, couldn't you do a similar attack against a > live > TCP session? Different because there you are interrupting a session, whereas with TFO you're starting a new connection and pushing data to the receiving app on a "new" connection. _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
