Re: [Tcpcrypt] New version of the charter text

Joe Touch <touch@isi.edu> Wed, 23 April 2014 18:38 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAF601A049F for <tcpcrypt@ietfa.amsl.com>; Wed, 23 Apr 2014 11:38:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.172
X-Spam-Level:
X-Spam-Status: No, score=-2.172 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.272] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HF8U4vdLYHPZ for <tcpcrypt@ietfa.amsl.com>; Wed, 23 Apr 2014 11:38:43 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id 9BE991A049A for <tcpcrypt@ietf.org>; Wed, 23 Apr 2014 11:38:43 -0700 (PDT)
Received: from [128.9.160.166] (abc.isi.edu [128.9.160.166]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s3NIcP7k002263 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 23 Apr 2014 11:38:25 -0700 (PDT)
Message-ID: <535808A1.6020406@isi.edu>
Date: Wed, 23 Apr 2014 11:38:25 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: marcelo bagnulo braun <marcelo@it.uc3m.es>, tcpcrypt@ietf.org
References: <53576572.5030805@it.uc3m.es> <5357F05C.3060507@isi.edu> <5357F2AD.9070307@it.uc3m.es> <5357F5FD.4070103@isi.edu> <5357FE5E.3070307@it.uc3m.es>
In-Reply-To: <5357FE5E.3070307@it.uc3m.es>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/W-unYxo8mNPW7rLOl3Mi0X5XFiM
Subject: Re: [Tcpcrypt] New version of the charter text
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Apr 2014 18:38:45 -0000

On 4/23/2014 10:54 AM, marcelo bagnulo braun wrote:
> El 23/04/14 19:18, Joe Touch escribió:
>>
>>
>> On 4/23/2014 10:04 AM, marcelo bagnulo braun wrote:
>> ...
>>>> > The WG will define the
>>>>> TCP extensions to perform an unauthenticated key exchange resulting in
>>>>> encryption
>>>>> without authentication.
>>>>
>>>> This implies in-band.
>>>
>>> Yes, the idea here is to provide a fully automatic mechanism, that
>>> people simply install and dont need to configure keys or anything.
>>
>> That is orthogonal as to whether the key exchange is in-band.
>>
>> Yes, a key exchange mechanism needs to be defined as part of the
>> system, but not necessarily inside the connection being protected.
>
> mmm, havent considered that.
> So the key exchange mechanism would be part of the work of the WG, correct?

Yes.

> How do you envision doing it other than inside the connection? like
> having a control connection to negotiate these things?
> (something like
> https://tools.ietf.org/id/draft-paasch-mptcp-control-stream-00.txt maybe?)

Sure- that's one possible way (i.e., that's what I meant by "in the data 
of a previous TCP connection").

I don't think we should pick in advance, though - let's see what people 
suggest first.

Joe