[Cake] [Codel] Proposing COBALT

Eric Dumazet eric.dumazet at gmail.com
Sat Jun 4 16:56:42 EDT 2016

On Sat, 2016-06-04 at 22:55 +0300, Jonathan Morton wrote:
> > On 4 Jun, 2016, at 20:49, Eric Dumazet <eric.dumazet at gmail.com> wrote:
> > 
> > ECN (as in RFC 3168) is well known to be trivially exploited by peers
> > pretending to be ECN ready, but not reacting to feedbacks, only to let
> > their packets traverse congested hops with a lower drop probability.
> In this case it is the sender cheating, not the receiver, nor the
> network.  ECN Nonce doesn’t apply, as it is designed to protect
> against the latter two forms of cheating (and in any case nobody ever
> deployed it).

Well, this is another demonstration of how ECN can be fooled, either by
malicious peers (senders and/or receivers), or simply bugs in TOS byte

Senders (or a buggy router) can mark all packets with ECT(0), regardless
of ECN being negotiated at all in TCP 3WHS

More information about the Cake mailing list