RE: Packet number encryption
"Lubashev, Igor" <ilubashe@akamai.com> Sun, 04 February 2018 17:49 UTC
Return-Path: <ilubashe@akamai.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C35B9127698 for <quic@ietfa.amsl.com>; Sun, 4 Feb 2018 09:49:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.711
X-Spam-Level:
X-Spam-Status: No, score=-0.711 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lyvlKNLd4jAR for <quic@ietfa.amsl.com>; Sun, 4 Feb 2018 09:49:50 -0800 (PST)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79E721275F4 for <quic@ietf.org>; Sun, 4 Feb 2018 09:49:50 -0800 (PST)
Received: from pps.filterd (m0122330.ppops.net [127.0.0.1]) by mx0b-00190b01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w14Hkpau029638; Sun, 4 Feb 2018 17:49:02 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=jan2016.eng; bh=wYu8BvFzP9p8jsa9I2g4urYvNpa4aOz3nfS0iO1Qqco=; b=m67HYsjJZBnGaykhagUUTntTiwFILFyqucT2hjZuIt/0mDZPJ/QeIhrCLROvs0o9IzKv tKczYg17ByBJc8EBXAYATLVQk8MbMv2FvlOTVE7R8RW/PY7Q5I2QAI/uRXZXhMkv6oEG Kk+iWDrHe6Oxi7BGTVPftCmhHE68zC5zmd8xJJUPMaSvynM4qDiZQn0FqY5VdkixZBoA xHGQRPUyRy94ygiS4ymoBCyGtSThli3AxrNIs0F1fBOgtP3kktJOzJVO6rDeEmX53lgd anyRUhde6zAFy5W0LShJYPt9Zh1Mn1mVI2MWLjA/Hjv5oSj6cSu1XPRJzTCG8h5Z6Vj6 ZA==
Received: from prod-mail-ppoint3 ([96.6.114.86]) by mx0b-00190b01.pphosted.com with ESMTP id 2fw5kx3uur-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 04 Feb 2018 17:49:01 +0000
Received: from pps.filterd (prod-mail-ppoint3.akamai.com [127.0.0.1]) by prod-mail-ppoint3.akamai.com (8.16.0.21/8.16.0.21) with SMTP id w14Hjr1i028488; Sun, 4 Feb 2018 12:49:01 -0500
Received: from email.msg.corp.akamai.com ([172.27.123.31]) by prod-mail-ppoint3.akamai.com with ESMTP id 2fw9a0tmht-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sun, 04 Feb 2018 12:49:00 -0500
Received: from USMA1EX-DAG1MB5.msg.corp.akamai.com (172.27.123.105) by usma1ex-dag1mb3.msg.corp.akamai.com (172.27.123.103) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Sun, 4 Feb 2018 12:48:59 -0500
Received: from USMA1EX-DAG1MB5.msg.corp.akamai.com ([172.27.123.105]) by usma1ex-dag1mb5.msg.corp.akamai.com ([172.27.123.105]) with mapi id 15.00.1263.000; Sun, 4 Feb 2018 12:48:58 -0500
From: "Lubashev, Igor" <ilubashe@akamai.com>
To: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, "Roni Even (A)" <roni.even@huawei.com>, Jana Iyengar <jri@google.com>, Roberto Peon <fenix@fb.com>, Piotr Galecki <piotr_galecki@affirmednetworks.com>, "Fossati, Thomas (Nokia - GB/Cambridge, UK)" <thomas.fossati@nokia.com>
CC: QUIC WG <quic@ietf.org>, Brian Trammell <ietf@trammell.ch>, Martin Thomson <martin.thomson@gmail.com>, Eric Rescorla <ekr@rtfm.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, Christian Huitema <huitema@huitema.net>, Gorry Fairhust <gorry@erg.abdn.ac.uk>, "Eggert, Lars" <lars@netapp.com>
Subject: RE: Packet number encryption
Thread-Topic: Packet number encryption
Thread-Index: AQHTmW31yPXsGERjf0mXrDq/23iDfaOM1RYAgABeoICAAAgVAIAAd3KAgAA8YgCAACPDAIAAAicAgAOBloCAALfcgIAACBoAgAEGFwCAANx+AIAARbYggABexQD//6xrgA==
Date: Sun, 04 Feb 2018 17:48:58 +0000
Message-ID: <fd246634688849819fe52b87fe3b30c1@usma1ex-dag1mb5.msg.corp.akamai.com>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <1F7FB3B8-A94C-4354-9944-FB09FB8DB68B@trammell.ch> <CABcZeBMbwdwyC9TxxHBLYaZKfNB-FG2wCGjqUZ_mNR-A1R47FA@mail.gmail.com> <9096e5ec-581e-875a-b1dd-bff0b05206fd@huitema.net> <CABkgnnWRQSAufwPss+qf=xAzCwRYeNNH8XLPm3yFaHxOb+ba4g@mail.gmail.com> <BF80500A-6277-45DC-8525-9C3FE138B76D@tik.ee.ethz.ch> <5A7191E0.6010003@erg.abdn.ac.uk> <5214AD93-8376-4B25-922F-AF5551CC2E95@netapp.com> <F990E064-E6F8-41A3-B791-F776C9955E15@nokia.com> <CAGD1bZab0GaZFsHwC+nw3AxxC4VusxMJ6oDanzk3dSDdWKAXdw@mail.gmail.com> <2C515BE8694C6F4B9B6A578BCAC32E2F83BA1443@MBX021-W3-CA-2.exch021.domain.local> <BY2PR15MB07757473DB9788558B902EB5CDF80@BY2PR15MB0775.namprd15.prod.outlook.com> <6E58094ECC8D8344914996DAD28F1CCD861B7F@DGGEMM506-MBX.china.huawei.com> <e529144067624fcba636fc8c24ee3ff4@usma1ex-dag1mb5.msg.corp.akamai.com> <CAN1APdfnHxa8Uj9vef7NTJssGqdztp7m8NADyJvnyrmAKy4M1A@mail.gmail.com>
In-Reply-To: <CAN1APdfnHxa8Uj9vef7NTJssGqdztp7m8NADyJvnyrmAKy4M1A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.43.20]
Content-Type: multipart/alternative; boundary="_000_fd246634688849819fe52b87fe3b30c1usma1exdag1mb5msgcorpak_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-02-04_03:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802040238
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-02-04_03:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802040238
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/jECa05Ki043rRj9O42zLtxuzXQA>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Feb 2018 17:49:55 -0000
If an end user is complaining of a problem watching a video stream, extraneous probe packets would not help to identify what exactly happened to user’s packets. In fact, just capturing QUIC’s encrypted packets numbers on two devices within your network would probably be enough to identify any issues between those devices. So it should be possible to rule in or rule out your own network, but it still would be impossible to answer the question: “If user claims a problem, and my networks seems ok, is the a problem upstream or downstream from me?” * Igor From: Mikkel Fahnøe Jørgensen [mailto:mikkelfj@gmail.com] Sent: Sunday, February 04, 2018 12:36 PM To: Roni Even (A) <roni.even@huawei.com>; Jana Iyengar <jri@google.com>; Roberto Peon <fenix@fb.com>; Lubashev, Igor <ilubashe@akamai.com>; Piotr Galecki <piotr_galecki@affirmednetworks.com>; Fossati, Thomas (Nokia - GB/Cambridge, UK) <thomas.fossati@nokia.com> Cc: QUIC WG <quic@ietf.org>; Brian Trammell <ietf@trammell.ch>; Martin Thomson <martin.thomson@gmail.com>; Eric Rescorla <ekr@rtfm.com>; Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>; Christian Huitema <huitema@huitema.net>; Gorry Fairhust <gorry@erg.abdn.ac.uk>; Eggert, Lars <lars@netapp.com> Subject: RE: Packet number encryption If you need to troubleshoot a network, what prevents you from injecting probe packets with random content on the same route? The more opaque QUIC is, the more likely it is that probe packets would behave the same. For that matter, QUIC could define stateless probe packets that must route the same as real connections. Mikkel On 4 February 2018 at 18.19.16, Lubashev, Igor (ilubashe@akamai.com<mailto:ilubashe@akamai.com>) wrote: The need to troubleshoot networks (at a minimum, to detect packet loss and reordering) is real. I would assume that every network would need to have an ability to do so. Ability to quickly troubleshoot and fix networks is not only “nice” for the networks themselves, but it is also very beneficial to QUIC users. Having networks wrap and unwrap packets at their boundaries is a possibility, though it has real costs and downsides. First, while networks could setup such wrapping for UDP port 443 traffic, what about QUIC traffic using other ports? Would networks need to wrap all UDP traffic? Second, this does reduce MTU for end users, reducing available bandwidth. Third, this would allow networks to only answer questions like: “Is my network the culprit of the problem?” instead of “Is the problem in my network, upstream from me, or downstream from me?”. Would it be considered outrageous to suggest that packet number encryption be an option negotiated during connection handshake? An end user client in “Privacy-Enhanced” mode would negotiate this, while end users not particularly concerned with connection migration linkability issues would leave this off? - Igor From: Roni Even (A) [mailto:roni.even@huawei.com<mailto:roni.even@huawei.com>] Sent: Sunday, February 04, 2018 2:47 AM To: Roberto Peon <fenix@fb.com<mailto:fenix@fb.com>>; Piotr Galecki <piotr_galecki@affirmednetworks.com<mailto:piotr_galecki@affirmednetworks.com>>; Jana Iyengar <jri@google.com<mailto:jri@google.com>>; Fossati, Thomas (Nokia - GB/Cambridge, UK) <thomas.fossati@nokia.com<mailto:thomas.fossati@nokia.com>> Cc: Gorry Fairhust <gorry@erg.abdn.ac.uk<mailto:gorry@erg.abdn.ac.uk>>; Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>>; Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>; Eggert, Lars <lars@netapp.com<mailto:lars@netapp.com>>; Brian Trammell <ietf@trammell.ch<mailto:ietf@trammell.ch>>; Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>>; QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>; Martin Thomson <martin.thomson@gmail.com<mailto:martin.thomson@gmail.com>> Subject: RE: Packet number encryption Hi, Network monitoring: Networks may always wrap the packet(s) they have received with whatever data they wish, and unwrap before forwarding. This can allow any network to understand ordering, loss, etc within its boundaries. RE- so you are saying that we can for example leverage RTP and define RTP payload for QUIC that will carry QUIC packets, we will just need to resolve the MTU size. Roni From: QUIC [mailto:quic-bounces@ietf.org] On Behalf Of Roberto Peon Sent: Saturday, February 03, 2018 8:38 PM To: Piotr Galecki; Jana Iyengar; Fossati, Thomas (Nokia - GB/Cambridge, UK) Cc: Gorry Fairhust; Eric Rescorla; Mirja Kühlewind; Eggert, Lars; Brian Trammell; Christian Huitema; QUIC WG; Martin Thomson Subject: Re: Packet number encryption Ossification: In the past tcp middleboxes expected in-order, monotonically increasing offsets and tried to fix reordering before forwarding. This middlebox behavior, predicated on observable flows, prevented deployment of things which would have made tcp more efficient. This is the kind of non-theoretical ossification that drove the creation of QUIC in the first place. Network monitoring: Networks may always wrap the packet(s) they have received with whatever data they wish, and unwrap before forwarding. This can allow any network to understand ordering, loss, etc within its boundaries. Debugging: Debugging of flows can still happen for flows that wish to be debugged-- the QUIC connection's key material(s) can be shared manually and used by the debugging tool. This is how one debugs http2, https, etc. already today. -=R -------- Original message -------- From: Piotr Galecki <piotr_galecki@affirmednetworks.com<mailto:piotr_galecki@affirmednetworks.com>> Date: 2/2/18 7:00 PM (GMT-08:00) To: Jana Iyengar <jri@google.com<mailto:jri@google.com>>, "Fossati, Thomas (Nokia - GB/Cambridge, UK)" <thomas.fossati@nokia.com<mailto:thomas.fossati@nokia.com>> Cc: Gorry Fairhust <gorry@erg.abdn.ac.uk<mailto:gorry@erg.abdn.ac.uk>>, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>>, Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>, "Eggert, Lars" <lars@netapp.com<mailto:lars@netapp.com>>, Brian Trammell <ietf@trammell.ch<mailto:ietf@trammell.ch>>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>>, QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>, Martin Thomson <martin.thomson@gmail.com<mailto:martin.thomson@gmail.com>> Subject: RE: Packet number encryption What is the group’s proposal for allowing network monitoring tools to detect packet retransmission or packet reordering ? These metrics are pretty straightforward to measure for TCP flows. Tools like Wireshark can analyze packets and spot issues. How can the network tools perform this kind of measurements for QUIC flows if PN field is encrypted? From: QUIC [mailto:quic-bounces@ietf.org] On Behalf Of Jana Iyengar Sent: Friday, February 02, 2018 9:31 PM To: Fossati, Thomas (Nokia - GB/Cambridge, UK) <thomas.fossati@nokia.com<mailto:thomas.fossati@nokia.com>> Cc: Gorry Fairhust <gorry@erg.abdn.ac.uk<mailto:gorry@erg.abdn.ac.uk>>; Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>>; Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>>; Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>; Brian Trammell <ietf@trammell.ch<mailto:ietf@trammell.ch>>; Eggert, Lars <lars@netapp.com<mailto:lars@netapp.com>>; QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>; Martin Thomson <martin.thomson@gmail.com<mailto:martin.thomson@gmail.com>> Subject: Re: Packet number encryption A few points as I catch up on this thread. First, I'll remind folks that QUIC is an encrypted transport. I say this because the cost of this operation is trivial in the context of encrypting every packet. The cost is borne at the servers and not at middleboxes, so the additional crypto cost is basically trivial. Second, this simplifies and increases robustness of implementation. Avoiding random PN jumps, as Kazuho points out, makes special-casing of code unnecessary. Special code that is exercised occasionally is a strong bug attractor, and I would strongly argue for as few of those as possible in implementation. Third, yes, ossification is a real concern. A simple example: using increasing packet numbers as a signature for detecting QUIC. Even if you argue against this example, there are innovative ways in which ossification will happen. This is based on a true story: We had no idea how GQUIC's flags field could get ossified, the value that was being used commonly became used as a signature for QUIC traffic (see Section 7.5 in the SIGCOMM QUIC paper<https://urldefense.proofpoint.com/v2/url?u=https-3A__static.googleusercontent.com_media_research.google.com_en_pubs_archive_46403.pdf&d=DwMGaQ&c=5VD0RTtNlTh3ycd41b3MUw&r=C0sUo-LFNBaYfyoaCsf6TA&m=SY87I4v_IqTCGOds-j5NCOwkQ0cJcYHGyKdXmMIVn6I&s=U9o6dI-dwzKwvXHvvmv7WtVm84puvxhaP0cN2of3VvA&e=>). There's a win here in terms of implementation complexity and several implementers have said so. There's a win in terms of ossification and our experience says so. There's a potential loss of manageability, in being able to detect reordering. This is the trade-off, and I am still in favor of encrypting packet numbers. On Fri, Feb 2, 2018 at 7:32 AM, Fossati, Thomas (Nokia - GB/Cambridge, UK) <thomas.fossati@nokia.com<mailto:thomas.fossati@nokia.com>> wrote: On 31/01/2018, 10:06, "QUIC on behalf of Eggert, Lars" <quic-bounces@ietf.org<mailto:quic-bounces@ietf.org> on behalf of lars@netapp.com<mailto:lars@netapp.com>> wrote: > On 2018-1-31, at 10:52, Gorry Fairhurst <gorry@erg.abdn.ac.uk<mailto:gorry@erg.abdn.ac.uk>> wrote: > > +1 - Simply: This *is* complicated and seems to add little. > > So as an implementor (chair hat off), this adds very little to the > overall complexity of the protocol. This doesn't sound great. It's a bit like saying that adding the Higgs mechanism to the standard model's lagrangian doesn't make it much more complicate :-) (*) More seriously though, I'd like to point out that it is not just about implementation complexity, it's also the energy cost per packet that is quite crucial. I haven't done the math but ISTM that bringing in another batch of non-optional crypto computation on a per packet basis is not going to move the needle in the right direction for stacks that run on low power (IoT). This is not a catastrophe - we have CoAP and a (D)TLS profile - but neither it's ideal, since cutting off the small things from the wider ecosystem creates an artificial gap which then will need a middlebox to bridge. (Sure, we have specified the behaviour of a similar box already, but it'd be really better if the extra translation logic could be avoided in the first place.) I guess what I'm saying is that PN encryption being a core mechanism that can't be negotiated at handshake time reduces our ability to later profile QUIC for the IoT, which would be a bit unlucky. So the question is: would it be possible to make this property a configurable knob instead? (*) https://www.symmetrymagazine.org/article/the-deconstructed-standard-model-equation<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.symmetrymagazine.org_article_the-2Ddeconstructed-2Dstandard-2Dmodel-2Dequation&d=DwMGaQ&c=5VD0RTtNlTh3ycd41b3MUw&r=C0sUo-LFNBaYfyoaCsf6TA&m=SY87I4v_IqTCGOds-j5NCOwkQ0cJcYHGyKdXmMIVn6I&s=etIO0AUHiJm8zucsWaTgo-XULFisCMoG2iDvwC69s9Q&e=>
- Packet number encryption Martin Thomson
- Re: Packet number encryption Ian Swett
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Eric Rescorla
- Re: Packet number encryption Christian Huitema
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Mirja Kühlewind
- Re: Packet number encryption Gorry Fairhurst
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Eggert, Lars
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Ted Hardie
- Re: Packet number encryption Ted Hardie
- Re: Packet number encryption Christian Huitema
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Christian Huitema
- Re: Packet number encryption Jana Iyengar
- RE: Packet number encryption Roni Even (A)
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Martin Duke
- Re: Packet number encryption Kazuho Oku
- Re: Packet number encryption Christian Huitema
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mirja Kühlewind
- Re: Packet number encryption Mirja Kühlewind
- Re: Packet number encryption Kazuho Oku
- Re: Packet number encryption Dmitri Tikhonov
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Fossati, Thomas (Nokia - GB/Cambridge, UK)
- Re: Packet number encryption Jana Iyengar
- RE: Packet number encryption Piotr Galecki
- Re: Re: Packet number encryption alexandre.ferrieux
- Re: Packet number encryption Patrick McManus
- Re: Packet number encryption Fossati, Thomas (Nokia - GB/Cambridge)
- Re: Packet number encryption Stephen Farrell
- Re: Packet number encryption Roberto Peon
- RE: Packet number encryption Piotr Galecki
- RE: Packet number encryption Roni Even (A)
- RE: Packet number encryption Lubashev, Igor
- RE: Packet number encryption Lubashev, Igor
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Lubashev, Igor
- Re: Packet number encryption Stephen Farrell
- Re: Packet number encryption Fossati, Thomas (Nokia - GB/Cambridge)
- Re: Packet number encryption Fossati, Thomas (Nokia - GB/Cambridge)
- Re: Packet number encryption Stephen Farrell
- Re: Packet number encryption Willy Tarreau
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Brian Trammell (IETF)
- Reducing ossification through protocol design (wa… Brian Trammell (IETF)
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Roberto Peon
- Re: Packet number encryption Salz, Rich
- Re: Packet number encryption Jana Iyengar
- RE: Packet number encryption Roni Even
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Roni Even (A)
- Re: Packet number encryption Roberto Peon
- Re: Reducing ossification through protocol design… Gorry Fairhurst
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Kazuho Oku
- RE: Packet number encryption Roni Even (A)
- Re: Reducing ossification through protocol design… Mirja Kühlewind
- Re: Reducing ossification through protocol design… Salz, Rich
- Re: Reducing ossification through protocol design… Mirja Kühlewind
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mike Bishop
- RE: Reducing ossification through protocol design… Mike Bishop
- Re: Packet number encryption Jana Iyengar
- Re: Packet number encryption Jana Iyengar
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Ted Hardie
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Marten Seemann
- RE: Packet number encryption Roni Even (A)
- Re: Packet number encryption Marten Seemann
- Re: Packet number encryption Brian Trammell (IETF)
- Re: Packet number encryption Kazuho Oku
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Gorry Fairhurst
- Explicit measurability in the QUIC wire image (wa… Brian Trammell (IETF)
- Explicit measurability in the QUIC wire image (wa… Brian Trammell (IETF)
- RE: Explicit measurability in the QUIC wire image… Roni Even (A)
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mirja Kühlewind
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Stephen Farrell
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- RE: Packet number encryption Mike Bishop
- Re: Packet number encryption Jana Iyengar
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Eric Rescorla
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Ian Swett
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Martin Thomson
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Christian Huitema
- Re: Packet number encryption Marten Seemann
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Explicit measurability in the QUIC wire image… Martin Thomson
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mirja Kühlewind
- Re: Explicit measurability in the QUIC wire image… Mikkel Fahnøe Jørgensen
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Packet number encryption Brian Trammell (IETF)
- RE: Packet number encryption Praveen Balasubramanian
- Re: Explicit measurability in the QUIC wire image… Christian Huitema
- Re: Explicit measurability in the QUIC wire image… Christian Huitema
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Explicit measurability in the QUIC wire image… Kazuho Oku
- Re: Packet number encryption Victor Vasiliev
- Re: Packet number encryption Salz, Rich
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mike Bishop
- Re: Packet number encryption Christian Huitema
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mike Bishop
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Salz, Rich
- Re: Packet number encryption Eric Rescorla
- Re: Packet number encryption Eric Rescorla
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Eric Rescorla
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Ian Swett
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Salz, Rich
- Re: Packet number encryption Ian Swett
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption David Benjamin
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Deval, Manasi
- RE: Packet number encryption Deval, Manasi
- Re: Packet number encryption Victor Vasiliev
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: hardware offload (was: Packet number encrypti… Ian Swett
- Re: Packet number encryption Ian Swett
- Re: Packet number encryption Martin Thomson
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- RE: Packet number encryption Praveen Balasubramanian
- Re: Packet number encryption Salz, Rich
- RE: Packet number encryption Praveen Balasubramanian
- RE: hardware offload (was: Packet number encrypti… Praveen Balasubramanian
- Re: Packet number encryption Salz, Rich
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Victor Vasiliev
- Re: hardware offload (was: Packet number encrypti… Christian Huitema
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: hardware offload (was: Packet number encrypti… Eggert, Lars
- RE: Packet number encryption Praveen Balasubramanian
- RE: hardware offload (was: Packet number encrypti… Praveen Balasubramanian
- RE: Packet number encryption Praveen Balasubramanian
- RE: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Victor Vasiliev
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Kazuho Oku
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen
- Re: Packet number encryption Mikkel Fahnøe Jørgensen