Re: [Tcpcrypt] v3 of the charter

David Mazieres <dm-list-tcpcrypt@scs.stanford.edu> Thu, 01 May 2014 19:18 UTC

Return-Path: <dm-list-tcpcrypt@scs.stanford.edu>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE0271A6FF2 for <tcpcrypt@ietfa.amsl.com>; Thu, 1 May 2014 12:18:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.551
X-Spam-Level:
X-Spam-Status: No, score=-1.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFwugmUJziKS for <tcpcrypt@ietfa.amsl.com>; Thu, 1 May 2014 12:18:45 -0700 (PDT)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) by ietfa.amsl.com (Postfix) with ESMTP id 9C3DA1A6FC7 for <tcpcrypt@ietf.org>; Thu, 1 May 2014 12:18:44 -0700 (PDT)
Received: from market.scs.stanford.edu (localhost.scs.stanford.edu [127.0.0.1]) by market.scs.stanford.edu (8.14.7/8.14.7) with ESMTP id s41F4S7B024649; Thu, 1 May 2014 08:04:28 -0700 (PDT)
Received: (from dm@localhost) by market.scs.stanford.edu (8.14.7/8.14.7/Submit) id s41F4R7S024066; Thu, 1 May 2014 08:04:27 -0700 (PDT)
X-Authentication-Warning: market.scs.stanford.edu: dm set sender to dm-list-tcpcrypt@scs.stanford.edu using -f
From: David Mazieres <dm-list-tcpcrypt@scs.stanford.edu>
To: marcelo bagnulo braun <marcelo@it.uc3m.es>, tcpcrypt@ietf.org
In-Reply-To: <5361FCBD.6010509@it.uc3m.es>
References: <536099A0.30900@it.uc3m.es> <23862F2E-9D56-4651-9202-FC676D15720B@netapp.com> <07C2D017-9342-4742-990C-7D3BC795049F@netapp.com> <536157E1.2060202@fifthhorseman.net> <53615A40.9050903@isi.edu> <536165C6.20909@fifthhorseman.net> <536167CC.8010703@isi.edu> <536168FA.2010800@fifthhorseman.net> <53616AD4.6010309@isi.edu> <53616D52.3090504@fifthhorseman.net> <5361824F.8080506@iang.org> <536187C1.3060009@isi.edu> <5361FCBD.6010509@it.uc3m.es>
Date: Thu, 01 May 2014 08:04:27 -0700
Message-ID: <87ha59zgjo.fsf@ta.scs.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/ZANhlw8VNAy73NJezujg1NxFFxk
Subject: Re: [Tcpcrypt] v3 of the charter
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: David Mazieres expires 2014-07-30 PDT <mazieres-n2dt28vgwbtr8c37tzs7uyb7fi@temporary-address.scs.stanford.edu>
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 May 2014 19:18:46 -0000

marcelo bagnulo braun <marcelo@it.uc3m.es> writes:

>> FWIW, mine too - IMO, the issue of anti-fingerprinting can be 
>> specified without reference to role, in which case whether 
>> simultaneous open is supported or not can be determined in a candidate 
>> solution.
>>
>
> could you propose text?

How about eliminating the paragraph about anti-fingerprinting, and
instead changing this text:

> - An extended API describing how applications can obtain further
>   benefits of the proposed extensions. In particular, the hooks for
>   supporting external authentication will be defined in this
>   document. This will be an informational document.

To the following:

        ... In particular, the hooks for supporting external
        authentication will be defined in this document.  In addition,
        the document shall specify functions that allow control over any
        session parameters such as accepted ciphers or re-use of
        cryptographic material from prior sessions (if the protocol
        supports such re-use) and that help prevent multiple TCP
        Inc. connections from being linked to the same endpoint.

David