Re: [Tcpcrypt] New version of the charter text

John-Mark Gurney <jmg@funkthat.com> Wed, 23 April 2014 18:00 UTC

Return-Path: <jmg@h2.funkthat.com>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A16A1A048A for <tcpcrypt@ietfa.amsl.com>; Wed, 23 Apr 2014 11:00:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.174
X-Spam-Level:
X-Spam-Status: No, score=-2.174 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.272, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ckt92_lIzO5T for <tcpcrypt@ietfa.amsl.com>; Wed, 23 Apr 2014 11:00:25 -0700 (PDT)
Received: from h2.funkthat.com (gate2.funkthat.com [208.87.223.18]) by ietfa.amsl.com (Postfix) with ESMTP id 971721A047E for <tcpcrypt@ietf.org>; Wed, 23 Apr 2014 11:00:25 -0700 (PDT)
Received: from h2.funkthat.com (localhost [127.0.0.1]) by h2.funkthat.com (8.14.3/8.14.3) with ESMTP id s3NI0J56013516 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 23 Apr 2014 11:00:19 -0700 (PDT) (envelope-from jmg@h2.funkthat.com)
Received: (from jmg@localhost) by h2.funkthat.com (8.14.3/8.14.3/Submit) id s3NI0Itj013515; Wed, 23 Apr 2014 11:00:18 -0700 (PDT) (envelope-from jmg)
Date: Wed, 23 Apr 2014 11:00:18 -0700
From: John-Mark Gurney <jmg@funkthat.com>
To: marcelo bagnulo braun <marcelo@it.uc3m.es>
Message-ID: <20140423180018.GJ43976@funkthat.com>
References: <53576572.5030805@it.uc3m.es> <5357F05C.3060507@isi.edu> <5357F2AD.9070307@it.uc3m.es> <5357F5FD.4070103@isi.edu> <5357FE5E.3070307@it.uc3m.es>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <5357FE5E.3070307@it.uc3m.es>
User-Agent: Mutt/1.4.2.3i
X-Operating-System: FreeBSD 7.2-RELEASE i386
X-PGP-Fingerprint: 54BA 873B 6515 3F10 9E88 9322 9CB1 8F74 6D3F A396
X-Files: The truth is out there
X-URL: http://resnet.uoregon.edu/~gurney_j/
X-Resume: http://resnet.uoregon.edu/~gurney_j/resume.html
X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE
X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger?
X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.2 (h2.funkthat.com [127.0.0.1]); Wed, 23 Apr 2014 11:00:19 -0700 (PDT)
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/TN-aimLx9gFME9ttdrLXTvW08cM
Cc: tcpcrypt@ietf.org, Joe Touch <touch@isi.edu>
Subject: Re: [Tcpcrypt] New version of the charter text
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Apr 2014 18:00:27 -0000

marcelo bagnulo braun wrote this message on Wed, Apr 23, 2014 at 19:54 +0200:
> El 23/04/14 19:18, Joe Touch escribió:
> >
> >On 4/23/2014 10:04 AM, marcelo bagnulo braun wrote:
> >...
> >>>> The WG will define the
> >>>>TCP extensions to perform an unauthenticated key exchange resulting in
> >>>>encryption
> >>>>without authentication.
> >>>
> >>>This implies in-band.
> >>
> >>Yes, the idea here is to provide a fully automatic mechanism, that
> >>people simply install and dont need to configure keys or anything.
> >
> >That is orthogonal as to whether the key exchange is in-band.
> >
> >Yes, a key exchange mechanism needs to be defined as part of the 
> >system, but not necessarily inside the connection being protected.
> 
> mmm, havent considered that.
> So the key exchange mechanism would be part of the work of the WG, correct?
> 
> How do you envision doing it other than inside the connection? like 

Yes, this would be nice to know...

> having a control connection to negotiate these things?
> (something like 
> https://tools.ietf.org/id/draft-paasch-mptcp-control-stream-00.txt maybe?)

This should be entirely in kernel, as requiring a daemon to pass non-TCP
traffic before any encrypted TCP traffic can be sent it a bad idea...

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."