Jump to content

Protocol spoofing

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by QEDquid (talk | contribs) at 19:35, 29 December 2005 (stub explaining "legitimate" spoofing (performance optimization)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Protocol spoofing is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.

A communications device such as a modem or router simulates ("spoofs") the remote endpoint of a connection to a locally attached host, while communicating with a compatible remote device using a more appropriate protocol.

Note: In a computer security context, spoofing refers to various forms of falsification of data. Protocol spoofing as discussed here is a legitimate technique, not an attack method.

Examples

  • UUCP spoofing such as implemented in Telebit, Multitech and other modems
  • TCP spoofing for links having a high bandwidth x delay product (satellite links)