]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Replace broken link with Wayback Machine link
authorDaniel Lenski <dlenski@gmail.com>
Wed, 19 Jul 2023 14:41:16 +0000 (07:41 -0700)
committerDaniel Lenski <dlenski@gmail.com>
Wed, 19 Jul 2023 21:50:19 +0000 (14:50 -0700)
The article "Why TCP Over TCP Is A Bad Idea" is very useful for explaining
why VPNs perform better when using UDP-based transport (DTLS or ESP) rather
than TCP-based transport (TLS), but unfortunately the original site is no
longer available.

Replace it with a link to the Internet Archive's Waback Machine, specifically
https://web.archive.org/web/20230228035749/http://sites.inka.de/~W1011/devel/tcp-tcp.html

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
openconnect.8.in
www/anyconnect.xml
www/f5.xml
www/fortinet.xml
www/globalprotect.xml
www/mitm.xml

index 9771a759441e8865725d9d5ffb07b1a810858627..293d3acbcf9e199315bcef786ea4aab96a1d0a6c 100644 (file)
@@ -111,7 +111,7 @@ may be disabled with
 but is preferred when correctly supported by the server and network
 for performance reasons. (TCP performs poorly and unreliably over
 TCP-based tunnels; see
-.IR http://sites.inka.de/~W1011/devel/tcp-tcp.html .)
+.IR https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html .)
 
 .SH OPTIONS
 .TAG opt-config
index 8aa631699be12fa753a3ed6e4a57236c48d14526..43ca35b72d176c3513a2205c4a939c13aa01d7f2 100644 (file)
@@ -30,7 +30,7 @@ then pass traffic over that connection. IP addresses and routing
 information are passed back and forth in the headers of that
 <tt>CONNECT</tt> request.</p>
 
-<p>Since <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP
+<p>Since <a href="https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP
 over TCP is very suboptimal</a>, the VPN also attempts to use UDP
 datagrams, and will only <em>actually</em> pass traffic over the HTTPS
 connection if that fails. The UDP connectivity is done using Datagram
index aa6dc39c3c84be90590c233985c2ecae310c2167..37fc873b3744218411cfa9277370937c8268a9c9 100644 (file)
@@ -24,7 +24,7 @@ to the command line:
   openconnect --protocol=f5 big-ip.example.com
 </pre></p>
 
-<p>Since <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
+<p>Since <a href="https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
 TCP is very suboptimal</a>, OpenConnect tries to always use PPP-over-DTLS,
 and will only fall over to the PPP-over-TLS tunnel if that fails, or if
 disabled via the <tt>--no-dtls</tt> argument.</p>
index 6738204306b2a335928e9209bf095f9349c43b94..bd59032a9c0443d1e58df2ea3493585960cebe99 100644 (file)
@@ -24,7 +24,7 @@ to the command line:
   openconnect --protocol=fortinet fortigate.example.com
 </pre></p>
 
-<p>Since <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
+<p>Since <a href="https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
 TCP is very suboptimal</a>, OpenConnect tries to always use PPP-over-DTLS,
 and will only fall over to the PPP-over-TLS tunnel if that fails, or if
 disabled via the <tt>--no-dtls</tt> argument.</p>
index 2152b222a69961338d8b1d0a7fc13db8f9171b11..2a158ced3df5bffea8490e7b6192115a14f03c63 100644 (file)
@@ -86,7 +86,7 @@ generated by the client and submitted to the server, if required.</p>
       ESP</a> tunnel.</li>
 </ol>
 
-<p>Since <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
+<p>Since <a href="https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
 TCP is very suboptimal</a>, OpenConnect tries to always use ESP-over-UDP,
 and will only fall over to the HTTPS tunnel if that fails, or if disabled
 via the <tt>--no-dtls</tt> argument.</p>
index 155de617485efaf5409d5adc51b52e5796119ad8..d70ba8e58998ebd9db5cab4818a2d77e12216cf1 100644 (file)
@@ -25,7 +25,7 @@ understand how they work.</p>
 <p>Modern VPN protocols almost always support a UDP-based transport
 for tunneled packets, e.g. DTLS for the Cisco AnyConnect protocol, or
 ESP for the GlobalProtect protocol. This is because <a
-href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over TCP is
+href="https://web.archive.org/web/20230228035749/https://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over TCP is
 very suboptimal</a> in terms of performance. However, most VPN
 protocols also support TLS/SSL for connection initiation and as a
 fallback, due to its universal availability even in highly filtered or