[Bloat] MiM attacks in the L4S low latency networking environment
Douglas Goncz A.A.S. M.E.T. 1990
DGoncz at replikon.net
Fri Jun 23 02:57:13 EDT 2023
Moderators please note the most recent digest contained some information
about l4s testing.
I was stimulated by progress in the l4s area to consider whether reduction
in latency would affect susceptibility of buffers to MIM and other attacks
I received a note from automatic robot somewhere saying that I posted to a
members only list using an unsubscribed address
I repeat the address used for this communication
dgoncz at replikon.net
Is it possible that a capitalization error has caused the robot to think
this is an unsubscribed address?
For example using various email clients the mail might be sent from
DGoncz at Replikon.net
....,
Douglas
On Thu, Jun 22, 2023, 6:57 AM Douglas Goncz A.A.S. M.E.T. 1990 <
DGoncz at replikon.net> wrote:
> Theorem:
>
> If N bots cooperate in
>
> A man in the middle attack or a denial of service attack in an L4S
> environment, with 1 point of entry into each susceptible buffer,
>
> WITH
>
> A generalized fixed estimated probability of success 0 < P.S.1 < 1 = (1 -
> P.F.1)
>
> THEN including interactions between the bots the
>
> Generalized probability of success is (about):
>
> P.S.N ~= 1 - ( (1-P.S.1) ^ (N^2 - N) ).
>
> Reframed for sci-fi physics research:
>
> If 1 atom fissions in a specific amount of time with probability P.S.1
> above,
>
> Do N tightly coupled atoms fission with probability P.S.N in the same
> amount of time?
>
> Douglas
> REPLIKON Research 783774974
>
> BCC:
> Lynch PhD,
> Teri,
> Jason, and
> MIT81
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.bufferbloat.net/pipermail/bloat/attachments/20230623/f9bf59ae/attachment-0001.html>
More information about the Bloat
mailing list