[perpass] tcpcrypt applicability (Was: Re: Violating end-to-end principle: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 20 January 2014 15:19 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F79D1A01A0 for <perpass@ietfa.amsl.com>; Mon, 20 Jan 2014 07:19:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.435
X-Spam-Level:
X-Spam-Status: No, score=-2.435 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zd6LBNcFxsTp for <perpass@ietfa.amsl.com>; Mon, 20 Jan 2014 07:19:00 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 8CB581A019D for <perpass@ietf.org>; Mon, 20 Jan 2014 07:19:00 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 8C995BE47; Mon, 20 Jan 2014 15:19:00 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8QBwAE80gIhe; Mon, 20 Jan 2014 15:19:00 +0000 (GMT)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 6BB43BE39; Mon, 20 Jan 2014 15:19:00 +0000 (GMT)
Message-ID: <52DD3E64.2000707@cs.tcd.ie>
Date: Mon, 20 Jan 2014 15:19:00 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Stephen Kent <kent@bbn.com>
References: <04c001cf1123$7e5c00c0$7b140240$@olddog.co.uk> <CAMm+Lwj0r3PNoBC0Y1ydibD3piioZ57Z1Ks-Ea6o58xahjXKwQ@mail.gmail.com> <20140116192320.GD32098@thunk.org> <52D84F68.7030100@cs.tcd.ie> <52DD3CAA.6010004@bbn.com>
In-Reply-To: <52DD3CAA.6010004@bbn.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: perpass <perpass@ietf.org>
Subject: [perpass] tcpcrypt applicability (Was: Re: Violating end-to-end principle: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt)
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jan 2014 15:19:02 -0000

On 01/20/2014 03:11 PM, Stephen Kent wrote:
>> For example, when the tcpcrypt folks turned up at the IETF a
>> couple of years ago I was against it really. That was mostly
>> because I figured we already had TLS so why would we want
>> another thing that's so similar but partly because they were
>> selling it as "better" than TLS. I've now concluded that I
>> was wrong about that and am encouraging them as I can.
> I wish you wouldn't encourage them. I can easily see confusion
> and non-interoperability arising because of the need to choose
> between TLS and tcpcrypt.

I think its fair to say that the question of when tcpcrypt
might be a better tool to use than TLS is an open one, and
one where it'd be good to have some deployment experience
before making recommendations.

Speculating, I'd expect that if tcpcrypt were implemented in
some kernels then it'd be useful in places where you can't
feasibly use TLS. But that's me speculating and I'm sure
the proponents of tcpcrypt can give you a better answer.

S.