22.7.2. Proxying Characteristics of Mostly Harmless Protocols
While it would be theoretically quite easy to proxy most of these
protocols (the proxy for
discard is particularly
simple to write), the sheer pointlessness of doing so means that
proxies for them are not widely available. In particular, on the rare
occasions when
chargen,
echo, and
discard are used,
they're used to gather data about network performance, which
will be obscured if a proxy is in the transaction.