Re: [multipathtcp] new tcpcrypt draft available

Christoph Paasch <christoph.paasch@uclouvain.be> Mon, 17 February 2014 11:56 UTC

Return-Path: <christoph.paasch@uclouvain.be>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 640131A0316 for <multipathtcp@ietfa.amsl.com>; Mon, 17 Feb 2014 03:56:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EXOxVXSMBo-3 for <multipathtcp@ietfa.amsl.com>; Mon, 17 Feb 2014 03:56:01 -0800 (PST)
Received: from smtp5.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) by ietfa.amsl.com (Postfix) with ESMTP id DB22B1A0143 for <multipathtcp@ietf.org>; Mon, 17 Feb 2014 03:56:00 -0800 (PST)
Received: from localhost (haproxy2.sipr.ucl.ac.be [130.104.5.120]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: cpaasch@smtp5.sgsi.ucl.ac.be) by smtp5.sgsi.ucl.ac.be (Postfix) with ESMTPSA id EC0DE19802F; Mon, 17 Feb 2014 12:55:52 +0100 (CET)
X-DKIM: Sendmail DKIM Filter v2.8.3 smtp5.sgsi.ucl.ac.be EC0DE19802F
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1392638153; bh=0PbaiiuC87ESgNDCUdJMv/PX1Ea7nb4egtAfT1zsrgg=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:In-Reply-To; b=YwiH1UIkeSSpVYVBL/Riq0ZLskgCnolZwHhWbSI0KaD2zCUl+BVA/rP4+wMB+ITN3 B/77xyZP6dCkTJayXtok1v4KHqHqDMn42qy5MdsRyeMyQ5EQxNZtwAovW9ukCWp+6Q Ig3XcJt+zDxG0gJLUToK6plt4uh7uEfMVJp3wPq8=
Date: Mon, 17 Feb 2014 12:55:52 +0100
From: Christoph Paasch <christoph.paasch@uclouvain.be>
To: Andrea Bittau <bittau@cs.stanford.edu>
Message-ID: <20140217115552.GD4609@cpaasch-mac>
References: <CABu4T3+JhOs7xwvqQW=2wVkOjMUFt-w-grzB4p2+XQY-POd59Q@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABu4T3+JhOs7xwvqQW=2wVkOjMUFt-w-grzB4p2+XQY-POd59Q@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Virus-Scanned: clamav-milter 0.97.7-exp at smtp-5.sipr-dc.ucl.ac.be
X-Virus-Status: Clean
X-Sgsi-Spamcheck: SASL authenticated,
X-SGSI-MailScanner-ID: EC0DE19802F.A1725
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: christoph.paasch@uclouvain.be
X-SGSI-Spam-Status: No
Archived-At: http://mailarchive.ietf.org/arch/msg/multipathtcp/1HA2ecbayouXcqeyIJZGyWMEdUo
Cc: multipathtcp@ietf.org
Subject: Re: [multipathtcp] new tcpcrypt draft available
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2014 11:56:03 -0000

Hello Andrea,

On 16/02/14 - 14:54:18, Andrea Bittau wrote:
> For those interested, we posted a revised version of the tcpcrypt
> draft (opportunistic TCP encryption):
> 
> http://www.ietf.org/id/draft-bittau-tcp-crypt-04.txt
> 
> This will be discussed on Monday morning in tcpm, at the end of
> Session 1 (09:00--11:30).
> 
> All comments are welcome, including any points that you'd like us to
> address in our presentation.

I think it would be important to consider moving the MAC from the TCP
options space to the payload (similar to an SSL-record) to allow support
for TSO and segment splitting middleboxes and to avoid using up all the TCP
option space.


Cheers,
Christoph