Abstract:
An electronic device includes a traffic redirect module that creates a traffic sink interface that enables data to be sent to it, without generating an error if an underlying physical link does not exist. To send data over a physical link, a processor of the electronic device creates a network interface to connect to another electronic device using a transport connection over the physical link. If the physical link disconnects, then the processor removes the network interface, and the traffic redirect module redirects data to be sent to the other electronic device to use the traffic sink interface, without indicating that the physical link has disconnected. When the physical link reconnects, or a new physical link to the other electronic device is established, the processor creates a new network interface to connect to the other electronic device using the transport connection over the reconnected or new physical link.
Abstract:
A method, client device and non-transitory computer readable storage medium for connecting to a virtual private network (VPN). A request to connect to a destination identified by a hostname is received from an application executed on the client device and a domain name system (DNS) lookup functionality is performed on the hostname, the DNS lookup functionality returning an address. It is then determined whether the returned address is a redirected address, whether a hypertext transmission protocol secure (HTTPS) probe configured for the hostname fails, or whether the returned address matches a cached route in which a transmission control protocol (TCP) connection establishment is unsuccessful. If any of the returned address is a redirected address, the HTTPS probe fails or the returned address matches the cached route and the TCP connection establishment is unsuccessful, the client device is connected to the VPN.
Abstract:
Techniques are disclosed relating to communicating, via IPv6-only networks, with devices on IPv4 networks. In some embodiments, a mobile device stores program instructions executable to: generate a request to access a network server that specifies an IPv4 literal, query a DNS server using a reserved name to determine an IPv6 prefix, synthesize an IPv6 address using the prefix and the IPv4 literal, create a transport layer connection to the network server using the synthesized IPv6 address, and transmit multiple packets using the connection, without re-translating the IPv4 literal for the packets. These per-connection translation techniques may reduce power consumption and/or processing time relative to per-packet translation, in some embodiments.
Abstract:
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.
Abstract:
An electronic device includes a traffic redirect module that creates a traffic sink interface that enables data to be sent to it, without generating an error if an underlying physical link does not exist. To send data over a physical link, a processor of the electronic device creates a network interface to connect to another electronic device using a transport connection over the physical link. If the physical link disconnects, then the processor removes the network interface, and the traffic redirect module redirects data to be sent to the other electronic device to use the traffic sink interface, without indicating that the physical link has disconnected. When the physical link reconnects, or a new physical link to the other electronic device is established, the processor creates a new network interface to connect to the other electronic device using the transport connection over the reconnected or new physical link.
Abstract:
A system and method for selecting a network interface for a communication device having at least two radio physical interface, to improve communications by the communication device. A configuration of the communication device is determined, where a first radio physical interface is designated as a primary interface and active, and a second radio physical interface as idle. A networking subsystem of the operating system executes a state machine configured to monitor network conditions and associated performance parameters of the at least two radio physical interfaces, to automatically outrank the second radio physical interface over the first radio physical interface as the primary interface.
Abstract:
An electronic device includes a sequence generator module that generates a sequence in a predetermined order based on a traffic class of data to be sent. The sequence is written into a portion of a sequence header of an outgoing data packet that corresponds to the traffic class. A traffic class identifier is also written into a header of the packet that indicates the traffic class of the data. The electronic device sends the packet to another electronic device over one of multiple channels of multiple priorities. The other electronic device determines the traffic class of the data based on the traffic class identifier, extracts the sequence from the portion of the sequence header that corresponds to the traffic class, and compares the sequence to a previously extracted sequence of a previously received packet of the same traffic class to determine whether a replay attack has occurred.
Abstract:
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.
Abstract:
A method, client device and non-transitory computer readable storage medium for connecting to a virtual private network (VPN). A request to connect to a destination identified by a hostname is received from an application executed on the client device and a domain name system (DNS) lookup functionality is performed on the hostname, the DNS lookup functionality returning an address. It is then determined whether the returned address is a redirected address, whether a hypertext transmission protocol secure (HTTPS) probe configured for the hostname fails, or whether the returned address matches a cached route in which a transmission control protocol (TCP) connection establishment is unsuccessful. If any of the returned address is a redirected address, the HTTPS probe fails or the returned address matches the cached route and the TCP connection establishment is unsuccessful, the client device is connected to the VPN.
Abstract:
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.