RE: [ANNOUNCE] new release of the ParrotTalk protocol specification, version 3.7

Robert <robert.withers@pm.me> Thu, 22 November 2018 00:24 UTC

Return-Path: <robert.withers@pm.me>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55B9E129C6B for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 16:24:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=pm.me
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kFoH-ade18iG for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 16:24:18 -0800 (PST)
Received: from mail2.protonmail.ch (mail2.protonmail.ch [185.70.40.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE1C1128CF3 for <ietf@ietf.org>; Wed, 21 Nov 2018 16:24:17 -0800 (PST)
Date: Thu, 22 Nov 2018 00:24:05 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pm.me; s=proton; t=1542846250; bh=qkmrPiTfXOMUfjLofnxq68hCxLNaOrMCA+Af4BmH6SA=; h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References: Feedback-ID:From; b=M340eb0y9AACzVvB/6vnZmweGIYMeMrHWAJEgJYQgts6S8wqgdBOGUKkfRr05yer9 ENfulZJqkjvVPSjNauopzDDYyQKxC79HSNsKjLC7FI7rtarF7sfBS3X8NOlBGz3iGL t1vA4P2kHNWM9zi6oVyI5/NYaFT+9YCpcdwZKk2CcD9fO06/8AVIRIfIn7CSegWIj8 F8tCtTt8qTTusX5zGrFh1WKH7dZDlvc0OBQwGtv5JktRxreVYKHtQsMowhXPFLVCWL oa3WrFkyWkjFArBYElGbCaTvZ47AQCmcEkqJG6TZfImFMpV5OCSDheGe1Cz4TobS8P zzNYHfAaUN6Dg==
To: Valery Smyslov <smyslov.ietf@gmail.com>
From: Robert <robert.withers@pm.me>
Cc: 'Eric Rescorla' <ekr@rtfm.com>, 'IETF discussion list' <ietf@ietf.org>
Reply-To: Robert <robert.withers@pm.me>
Subject: RE: [ANNOUNCE] new release of the ParrotTalk protocol specification, version 3.7
Message-ID: <s4YjPDh6fNf3hy44l0hiWRlXH3gQvC6uxF7aYy-Ue5a8126HhTyshpyyzP1_EfiXTUvrPdVkRD0dmW_FMyK-NBQVodwwu1HfoOXnQAtZTlQ=@pm.me>
In-Reply-To: <011101d481b4$77d1edd0$6775c970$@gmail.com>
References: <SyrakryPyk1zzTAO_b_NyUPXPt4l3W1m9vt55Lg1m7sHhi1fi2TCmIbQCH5pqFtPpvR4rFWm-6DxNCGTCN7rSMBmGMnRSVx6v5xu_z2kKDI=@protonmail.com> <CAPt1N1n_kzQyeoy_fXKz3BLjiUYqWq2J9sm4=0STjeX51H+yjw@mail.gmail.com> <c1cFwZUvofxtc2Y63oyZ8Cz9iX3tT9IlAdPVAD-sfOh-fUy4sFXV9WEpO_tp7hownBT__us64FXidemK1QnrxGlShvK66z39f7ReNGj-j5s=@protonmail.com> <CABcZeBN64hbJ-hp+7Q9pzX+u0nv6Fiq0XYY_v22EB_no23Cy2A@mail.gmail.com> <c4Q4L5o9q57cegtvu6-TJHQnWk6TQ1viHoFm4gDiZCWVEHCZkZtJp2wqy8xwlaud8ND1vfwTM1sZglurtvhonqVhyJ29-TeGZ3BcawFZegs=@pm.me> <CABcZeBN1NfyhdBVudHQ=MgXmtun4T6RzCwO52aLV6k6DuPx8BA@mail.gmail.com> <011101d481b4$77d1edd0$6775c970$@gmail.com>
Feedback-ID: vEY7k4yIhKH60ezyh_ewYb5cBh9lM6d5hXuAKmMcj-2yeFvumZUf2Q6AIaPs9viRuOL95Jg0-5_mTgpMVWHl3Q==:Ext:ProtonMail
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1_56a07261bba3f0ee96bc154b3684687a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/TsuZfSHGrPdfkJ5JZhKj9z2igaM>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Nov 2018 00:24:22 -0000

Hello Valery,

I have never looked at IKE. I have implemented TLS 1.2 (http://www.squeaksource.com/Cryptography/SSL-CDavidShaffer.19.mcz) and SSH (http://www.squeaksource.com/Cryptography/SSH-rww.12.mcz), but they are both currently broken for some reason. It has been a number of years since I revisited them, and now I am thinking of porting them to the ThunkStack design of ParrotTalk. I would need a new ReceivingFrameBuff for them as ParrotTalks frames are different than either of those protocols. And of course a specific SessionOperations managing the state machine and message processing of each protocol. As I have said I am an implementation guy, as I think the code documents itself and test cases document the usage of the protocol. I really like to see them running in Squeak, but decided to shoot for interoperability with Java. Long ago Squeak Community decided correctly to use OpenSSL, as it is tested, approved and accepted.

Best,
Robert

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Wednesday, November 21, 2018 11:08 AM, Valery Smyslov <smyslov.ietf@gmail.com> wrote:

> Hi,
>
>> I will try to give my opinion why this protocol is superior. It is a minimal protocol to establish an encrypted connection. I view it as a positive that it does not use Certificates, you just need public and private keys for each agent.
>
> This is possible to do with TLS as well, using RFC 7250.
>
>           IKEv2 also supports raw public keys (RFC7670). And it can be profiled to extremely
>
>           simple protocol, maintaining interoperability with full-featured spec (see RFC7815).
>
>           Regards,
>
>           Valery Smyslov.