Re: Hardware acceleration and packet number encryption
Eric Rescorla <ekr@rtfm.com> Sun, 25 March 2018 12:25 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46C1C1241F8 for <quic@ietfa.amsl.com>; Sun, 25 Mar 2018 05:25:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.091
X-Spam-Level:
X-Spam-Status: No, score=0.091 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dlRqOru_zZBc for <quic@ietfa.amsl.com>; Sun, 25 Mar 2018 05:25:07 -0700 (PDT)
Received: from mail-ot0-x22c.google.com (mail-ot0-x22c.google.com [IPv6:2607:f8b0:4003:c0f::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 408FB1201FA for <quic@ietf.org>; Sun, 25 Mar 2018 05:25:07 -0700 (PDT)
Received: by mail-ot0-x22c.google.com with SMTP id v23-v6so17843514oth.9 for <quic@ietf.org>; Sun, 25 Mar 2018 05:25:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=PhaSh1dRWUFZywjzu7JgbaasbsbWxXmNB3Qj9qNI4wY=; b=sTXW+zU5q4qQlm6JbN90amcNNofUHtTjVFvg8Cq6AWTZkVu55Bj8nyqFDyFAj+Va0q D/3WluBjhVi5T2W1snx6VrVrnhUkAG+YJnhJfhYpQD18jpXyQVK1Y6BYydQ+koGHKYOe HEr+9T8ZfVZQ+XLIKsn2lZAusgHrKh8NK8H/hsR/OPjM07ieYf6eZe5AJn9kmHnvj4p1 3uaItlFIRxMnpAKb6NAO7johNKB6h5S3lnQFgjA0kvUkaUw6TwiFHhYQf+/AesnH/IYS vdKxZKhuLE9DN8frnXci4TJ5k/cPJ1SbocEU2AM7lJOUBnZd8iddcdMixK5sBG5BHnhg zIug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=PhaSh1dRWUFZywjzu7JgbaasbsbWxXmNB3Qj9qNI4wY=; b=GVBdDs3kVYnFH1tbVHBKh1pKc7TH0qbPn7qZ6qC8M0Piy+Oo6TGZkvZrfCrwnzgmES rCzYu4hSmhTIQ43nCQ0xDBDOWlJTyODbvqr+PfBS6l6E+orI4JH0aWDBznbR28RQQXOl BUoUcPsYcpDqGYFR6Jb9ikAssyCH8FJF9+UqIapG9tziLtHcoxhdXtAMl9dBhmBz7X8Z FKfcheEYf3CLMp+/UPQOwby7a+joMRllUB5+/65Coyzo4h/XHfWN1+xwzO32kjmZfcQ1 4TRNiAwyTfEYKkM+nOMd+zMQNa720AuQZl/GaZgb7PrkW3KanaIsA14Wn2IOP8s5si9L H2xQ==
X-Gm-Message-State: AElRT7E00cWuqSRsrAcZZHk2Cmqy8uO3Hys2TpsJqDQeXHCCK0kKWY/6 upwUF4x/dGaV8rEpDq4iZ/Lh1FFB2JR/QPHz05+e6A==
X-Google-Smtp-Source: AIpwx4+pH17o37zi3Znse0ly//BqsBd7ub1iKNCqzg5nQiiD0kJlZVTRhKoyyKvahV8W2iLJZGQXe7OlUus2Nn5n2ok=
X-Received: by 2002:a9d:4289:: with SMTP id r9-v6mr9915470ote.44.1521980706470; Sun, 25 Mar 2018 05:25:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.23.21 with HTTP; Sun, 25 Mar 2018 05:24:26 -0700 (PDT)
In-Reply-To: <82369B21-CDED-4A6F-9B32-FF1D93816D80@fb.com>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <F9FCC213-62B9-437C-ADF9-1277E6090317@gmail.com> <CABcZeBM3PfPkqVxPMcWM-Noyk=M2eCFWZw2Eq-XytbHM=0T9Uw@mail.gmail.com> <CAN1APdfjuvd1eBWCYedsbpi1mx9_+Xa6VvZ3aq_Bhhc+HN67ug@mail.gmail.com> <CABcZeBMtQBwsAF85i=xHmWN3PuGRkJEci+_PjS3LDXi7NgHyYg@mail.gmail.com> <1F436ED13A22A246A59CA374CBC543998B5CCEFD@ORSMSX111.amr.corp.intel.com> <CABcZeBNfPsJtLErBn1=iGKuLjJMo=jEB5OLxDuU7FxjJv=+b=A@mail.gmail.com> <82369B21-CDED-4A6F-9B32-FF1D93816D80@fb.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 25 Mar 2018 05:24:26 -0700
Message-ID: <CABcZeBNdxTuS-Nwi=KMofEezS0+BUgEoETh-+KM01XNKg4SzSQ@mail.gmail.com>
Subject: Re: Hardware acceleration and packet number encryption
To: Subodh Iyengar <subodh@fb.com>
Cc: "Deval, Manasi" <manasi.deval@intel.com>, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, IETF QUIC WG <quic@ietf.org>, Christian Huitema <huitema@huitema.net>, Kazuho Oku <kazuhooku@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000005d542205683bbf8b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/hWRcf3XU5pD015FOXc6V9A0yklM>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Mar 2018 12:25:10 -0000
On Sat, Mar 24, 2018 at 9:41 PM, Subodh Iyengar <subodh@fb.com> wrote: > When we were first discussing pne, we proposed that the tag be used as the > IV for the ctr operation. The pr samples encrypted data in the packet. Did > we change that for a reason? > I believe that's my alternative #1 and PR#1079. Would that help alleviate the buffering of the stream data? Because tag is > always the last thing in the packet. > I will let Manasi answer this. -Ekr > > Subodh > > > On Mar 25, 2018, at 2:56 AM, Eric Rescorla <ekr@rtfm.com> wrote: > > > > On Sun, Mar 25, 2018 at 2:09 AM, Deval, Manasi <manasi.deval@intel.com> > wrote: > >> From talking to several of the folks last week, I understand that >> unlinkability is the goal of this protocol and there may be some >> flexibility in how that can be achieved. >> >> >> >> Christian’s e-mail has a detailed list of options. Here is the list of >> favored options as I understand them. >> >> >> >> 1. Packet number encrypted as current suggestion - The current >> proposal for PR 1079, uses a two stage serialized approach such that the >> stream header(s) and payload(s) need to be encrypted and the outcome of >> encryption forms the nonce of the packet number encryption. >> >> >> >> 2. Packet number encrypted alternative 1 - One of the ideas >> suggested was to encrypt the stream header(s) and payload(s) with the >> packet number as nonce, but have an additional nonce in the clear to >> encrypt the packet number. A scheme like this can allow for these two >> encryption operations to occur in parallel. This still has the issue of >> serialization in decrypt. >> >> >> >> 3. Packet number encrypted alternative 2 – Another option is to >> generate 2 IVs – one for PN and the other for stream header(s) and >> payload(s). The nonce can be a random value in the clear. This allows us to >> encrypt and decrypt the two fields in parallel. The packet number is >> encrypted so it also solves the ossification problem. Another variation of >> this is to generate a single IV but use one part of it to encrypt the PN. >> > Neither of these alternatives seems ideal. Once you are carrying an > explicit per-packet nonce, you might as well concatenate the payload and > the PN and encrypt them together. The will require the least amount of > nonce material. > > -Ekr > > 4. PN in the clear – this is a complex scheme and in the discussion >> with Ian, Jana and Praveen, they seemed to think this may be ok. If folks >> think this is implementable, then we may need to find an alternate solution >> for ossification. >> >> >> >> Thanks, >> >> Manasi >> >> >> >> >> >> >> >> >> >> *From:* Eric Rescorla [mailto:ekr@rtfm.com] >> *Sent:* Saturday, March 24, 2018 3:18 PM >> *To:* Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com> >> *Cc:* Kazuho Oku <kazuhooku@gmail.com>; Deval, Manasi < >> manasi.deval@intel.com>; Christian Huitema <huitema@huitema.net>; IETF >> QUIC WG <quic@ietf.org> >> *Subject:* Re: Hardware acceleration and packet number encryption >> >> >> >> >> >> >> >> On Sat, Mar 24, 2018 at 9:35 PM, Mikkel Fahnøe Jørgensen < >> mikkelfj@gmail.com> wrote: >> >> AERO: I did not read all of it, but it does indeed sound esoteric. >> >> It can do two things of interest: reduce space used by packet numbers, >> and presumably fix the encryption issue. >> >> >> >> However, it has a W parameter which is the limit of reordering which is >> default 64 and recommended at most 255 for security reasons. This is way >> way too low (I would assume) if packet clusters take multiple transatlantic >> paths. >> >> >> >> That's just a function of how the packet numbers are encoded. It's not >> difficult to come up with a design that tolerates more reordering. >> >> >> >> -Ekr >> >> >> >> >> >> If we accepted such a limit, I could very trivially come up with an >> efficient solution to PN encryption. Since we cover at most 64 packets, we >> only need a 5 bit packet number and reject false positives on AEAD tag. To >> simplify, make it 8 bits. The algorithm is to AES encrypt a counter similar >> to a typical AES based PRNG. Then, for each packet take one byte from the >> stream and use it as packet number. The receiver creates the same stream >> and maps the received byte to an index it has. It might occasionally have >> to try multiple packet numbers since the mapping is not unique. Longer >> packet numbers reduce this conflict ratio. To help with this detection some >> short trial decryption might be included. The PN size can be extended as >> needed. >> >> >> >> The cost of doing this is much lower than direct encryption for as >> proposes in PR because 1) a single encryption covers multiple packets, 2) >> the encryption can be parallelised resulting in a 4-5 fold performance >> increase. Combined this results in sub-nanosecond overhead for AES-NI. >> >> >> >> However, you have to deal with uncertainties which is why this isn’t a >> very good idea unless you have some very good knowledge of the traffic >> pattern. It also complicates HW offloading, but I don’t see why it couldn’t >> be done efficiently. >> >> >> >> >> >> Mikkel >> >> >> >> On 24 March 2018 at 17.26.47, Eric Rescorla (ekr@rtfm.com) wrote: >> >> 3. A more exotic solution like AERO (https://tools.ietf.org/html/d >> raft-mcgrew-aero-00#ref-MF07 >> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dmcgrew-2Daero-2D00-23ref-2DMF07&d=DwMFaQ&c=5VD0RTtNlTh3ycd41b3MUw&r=h3Ju9EBS7mHtwg-wAyN7fQ&m=Kqui4PrKKRuP58njW3vlK_ZPgcQX0TQ9iXVtGY1Kp30&s=GthDylmhvmHUnMvnjBT05qJT9VrOTknvVoMbdC7ObLo&e=> >> ).. >> >> >> >> >> > >
- Hardware acceleration and packet number encryption Christian Huitema
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Kazuho Oku
- Re: Hardware acceleration and packet number encry… Eric Rescorla
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Kazuho Oku
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Eric Rescorla
- RE: Hardware acceleration and packet number encry… Deval, Manasi
- Re: Hardware acceleration and packet number encry… Eric Rescorla
- Re: Hardware acceleration and packet number encry… Subodh Iyengar
- Re: Hardware acceleration and packet number encry… Eric Rescorla
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Christian Huitema
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Ian Swett
- Re: Hardware acceleration and packet number encry… Christian Huitema
- RE: Hardware acceleration and packet number encry… Deval, Manasi
- Re: Hardware acceleration and packet number encry… Salz, Rich
- Re: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- Re: Hardware acceleration and packet number encry… Ian Swett
- RE: Hardware acceleration and packet number encry… Swindells, Thomas (Nokia - GB/Cambridge)
- RE: Hardware acceleration and packet number encry… Deval, Manasi
- Re: Hardware acceleration and packet number encry… Christian Huitema
- Re: Hardware acceleration and packet number encry… Jana Iyengar
- Re: Hardware acceleration and packet number encry… Ian Swett
- Re: Hardware acceleration and packet number encry… Watson Ladd
- RE: Hardware acceleration and packet number encry… Praveen Balasubramanian
- RE: Hardware acceleration and packet number encry… Praveen Balasubramanian
- RE: Hardware acceleration and packet number encry… Mikkel Fahnøe Jørgensen
- RE: Hardware acceleration and packet number encry… Praveen Balasubramanian
- Re: Hardware acceleration and packet number encry… Mark Nottingham
- RE: Hardware acceleration and packet number encry… Praveen Balasubramanian
- Getting to consensus on packet number encryption Mark Nottingham
- Re: Getting to consensus on packet number encrypt… Willy Tarreau
- Re: Getting to consensus on packet number encrypt… Mirja Kühlewind
- Re: Getting to consensus on packet number encrypt… Dmitri Tikhonov
- Re: Getting to consensus on packet number encrypt… Patrick McManus
- Re: Getting to consensus on packet number encrypt… Spencer Dawkins at IETF
- Re: Getting to consensus on packet number encrypt… Patrick McManus
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… Patrick McManus
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… Ted Hardie
- Re: Getting to consensus on packet number encrypt… Mirja Kühlewind
- RE: Getting to consensus on packet number encrypt… Mike Bishop
- Re: Getting to consensus on packet number encrypt… Dmitri Tikhonov
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- Re: Getting to consensus on packet number encrypt… Mark Nottingham
- Re: Getting to consensus on packet number encrypt… Ian Swett
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Mark Nottingham
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Martin Thomson
- RE: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- Re: Getting to consensus on packet number encrypt… Willy Tarreau
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- ECN signaling from userland Re: Getting to consen… Lars Eggert
- Re: ECN signaling from userland Re: Getting to co… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… alexandre.ferrieux
- Re: Getting to consensus on packet number encrypt… Eric Rescorla
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Mirja Kühlewind
- Re: Getting to consensus on packet number encrypt… Philipp S. Tiesel
- Privacy holes (was: Re: Getting to consensus on p… Christian Huitema
- Re: Privacy holes (was: Re: Getting to consensus … Frederick Kautz
- Re: Privacy holes (was: Re: Getting to consensus … Christian Huitema
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Privacy holes Gorry Fairhurst
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- RE: Privacy holes (was: Re: Getting to consensus … Mike Bishop
- RE: Privacy holes (was: Re: Getting to consensus … Mikkel Fahnøe Jørgensen
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- RE: Privacy holes (was: Re: Getting to consensus … Lubashev, Igor
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- RE: Privacy holes (was: Re: Getting to consensus … Praveen Balasubramanian
- RE: Privacy holes (was: Re: Getting to consensus … Lubashev, Igor
- RE: Privacy holes (was: Re: Getting to consensus … Lubashev, Igor
- RE: ECN signaling from userland Re: Getting to co… Praveen Balasubramanian
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Frederick Kautz
- Re: Privacy holes (was: Re: Getting to consensus … Willy Tarreau
- Re: Privacy holes (was: Re: Getting to consensus … Martin Thomson
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Martin Thomson
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- RE: Privacy holes (was: Re: Getting to consensus … Lubashev, Igor
- Re: Privacy holes (was: Re: Getting to consensus … Mikkel Fahnøe Jørgensen
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Brian Trammell (IETF)
- Re: Privacy holes (was: Re: Getting to consensus … Martin Thomson
- Re: Privacy holes (was: Re: Getting to consensus … Brian Trammell (IETF)
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Grips in the Wire Image for In-Network State (was… Brian Trammell (IETF)
- Re: Grips in the Wire Image for In-Network State … Mikkel Fahnøe Jørgensen
- Re: Privacy holes (was: Re: Getting to consensus … Martin Thomson
- Re: Privacy holes Roland Zink
- Re: Grips in the Wire Image for In-Network State … Kazuho Oku
- Re: Grips in the Wire Image for In-Network State … Martin Thomson
- Re: Grips in the Wire Image for In-Network State … Brian Trammell (IETF)
- Re: Grips in the Wire Image for In-Network State … Brian Trammell (IETF)
- Re: Privacy holes Ian Swett
- Re: Grips in the Wire Image for In-Network State … Spencer Dawkins at IETF
- Re: Grips in the Wire Image for In-Network State … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Grips in the Wire Image for In-Network State … Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Mark Nottingham
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… Ian Swett
- Bona fide loss measurement bits alexandre.ferrieux
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: [Potential Spoof] Re: Getting to consensus on… Roberto Peon
- RE: Privacy holes (was: Re: Getting to consensus … Praveen Balasubramanian
- Re: Privacy holes Christian Huitema
- RE: Privacy holes Praveen Balasubramanian
- Re: Privacy holes (was: Re: Getting to consensus … Ian Swett
- Re: Privacy holes (was: Re: Getting to consensus … Kazuho Oku
- Re: Privacy holes (was: Re: Getting to consensus … Martin Thomson
- Re: Getting to consensus on packet number encrypt… Mirja Kühlewind
- RE: Privacy holes (was: Re: Getting to consensus … Mike Bishop
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Mark Nottingham
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- RE: Getting to consensus on packet number encrypt… Deval, Manasi
- Re: Getting to consensus on packet number encrypt… Jana Iyengar
- Re: Getting to consensus on packet number encrypt… Ian Swett
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- RE: Getting to consensus on packet number encrypt… Mike Bishop
- Re: Getting to consensus on packet number encrypt… Ian Swett
- RE: Getting to consensus on packet number encrypt… Mike Bishop
- Re: Getting to consensus on packet number encrypt… Ian Swett
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Erik Kline
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Patrick McManus
- Re: Getting to consensus on packet number encrypt… Ian Swett
- Re: Getting to consensus on packet number encrypt… Patrick McManus
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Kazuho Oku
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- Re: Getting to consensus on packet number encrypt… Jana Iyengar
- Re: Getting to consensus on packet number encrypt… Martin Thomson
- Re: Getting to consensus on packet number encrypt… Boris Pismenny
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Ian Swett
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- Re: Getting to consensus on packet number encrypt… Martin Thomson
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Martin Thomson
- Re: Getting to consensus on packet number encrypt… Benjamin Kaduk
- Re: Getting to consensus on packet number encrypt… Salz, Rich
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: Getting to consensus on packet number encrypt… Spencer Dawkins at IETF
- Re: Getting to consensus on packet number encrypt… Ted Hardie
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Brian Trammell (IETF)
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- Re: Getting to consensus on packet number encrypt… Ted Hardie
- RE: Getting to consensus on packet number encrypt… Lubashev, Igor
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: Getting to consensus on packet number encrypt… Roberto Peon
- Re: [Potential Spoof] Re: Getting to consensus on… Roberto Peon
- Re: [Potential Spoof] Re: Getting to consensus on… Jana Iyengar
- RE: [Potential Spoof] Re: Getting to consensus on… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Spencer Dawkins at IETF
- Re: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- Re: [Potential Spoof] Re: Getting to consensus on… Mikkel Fahnøe Jørgensen
- Re: Getting to consensus on packet number encrypt… Benjamin Kaduk
- Re: Getting to consensus on packet number encrypt… Ian Swett
- Re: Getting to consensus on packet number encrypt… Mirja Kühlewind
- RE: Getting to consensus on packet number encrypt… Roni Even (A)
- Re: Getting to consensus on packet number encrypt… Dmitri Tikhonov
- Re: Getting to consensus on packet number encrypt… Gorry Fairhurst
- RE: Getting to consensus on packet number encrypt… Praveen Balasubramanian
- Re: Getting to consensus on packet number encrypt… Christian Huitema
- Re: Getting to consensus on packet number encrypt… Mikkel Fahnøe Jørgensen
- Re: Getting to consensus on packet number encrypt… Christian Huitema