Re: [Tcpcrypt] v3 of the charter

marcelo bagnulo braun <marcelo@it.uc3m.es> Wed, 30 April 2014 09:33 UTC

Return-Path: <marcelo@it.uc3m.es>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C30181A6F25 for <tcpcrypt@ietfa.amsl.com>; Wed, 30 Apr 2014 02:33:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.852
X-Spam-Level:
X-Spam-Status: No, score=-104.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jiBn-ii8hcNa for <tcpcrypt@ietfa.amsl.com>; Wed, 30 Apr 2014 02:33:22 -0700 (PDT)
Received: from smtp01.uc3m.es (smtp01.uc3m.es [163.117.176.131]) by ietfa.amsl.com (Postfix) with ESMTP id B42821A6F1F for <tcpcrypt@ietf.org>; Wed, 30 Apr 2014 02:33:22 -0700 (PDT)
Received: from smtp01.uc3m.es (localhost [127.0.0.1]) by localhost.uc3m.es (Postfix) with ESMTP id D65BCCD69EE; Wed, 30 Apr 2014 11:33:20 +0200 (CEST)
X-uc3m-safe: yes
X-uc3m-safe: yes
Received: from dummyhost11.it.uc3m.es (unknown [163.117.139.231]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: marcelo@smtp01.uc3m.es) by smtp01.uc3m.es (Postfix) with ESMTPSA id B5E49CD665C; Wed, 30 Apr 2014 11:33:20 +0200 (CEST)
Message-ID: <5360C361.9060606@it.uc3m.es>
Date: Wed, 30 Apr 2014 11:33:21 +0200
From: marcelo bagnulo braun <marcelo@it.uc3m.es>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: "Eggert, Lars" <lars@netapp.com>
References: <536099A0.30900@it.uc3m.es> <23862F2E-9D56-4651-9202-FC676D15720B@netapp.com> <5360B4B1.90106@it.uc3m.es> <22212FB9-B128-4EE9-8549-54685A33E461@netapp.com>
In-Reply-To: <22212FB9-B128-4EE9-8549-54685A33E461@netapp.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
X-TM-AS-Product-Ver: IMSS-7.1.0.1224-7.5.0.1017-20664.006
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/oLJfasAq7r34_Y3bbiP-rQqNiS4
Cc: "tcpcrypt@ietf.org" <tcpcrypt@ietf.org>
Subject: Re: [Tcpcrypt] v3 of the charter
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 09:33:26 -0000

will do all these
thanks

El 30/04/14 10:41, Eggert, Lars escribió:
> On 2014-4-30, at 10:30, marcelo bagnulo braun <marcelo@it.uc3m.es> wrote:
>> well, there are lost of different boxes out there that do very wierd things.
>> I dont want people saying "there is a box that does foo and it is imcopatible with the proposed solution" and that being a blocking argument as per the charter, hence the significant, makes sense?
> Understood. Then maybe rephrase as something like "TCP Inc. should work over the vast majority of paths that unmodified TCP works over?" I.e., just talk about the expected outcome.
>
>>>> - The protocol must have acceptable performance.  For example, the protocol may
>>>>   try to re-use existing cryptographic material for future communication between the
>>>>   same endpoints to avoid expensive public key operations on connection set up.
>>> There are two aspects to performance that this paragraph mixes together. One is latency, the other processing overhead. Reusing crypto material from previous instances may help with reducing latency overheads. But processing overhead matters, too. Servers wont be able to offload TCP Inc. (at least initially), and clients w/o crypto hardware acceleration of some sort will need to burn cycles (= battery). I don't want to compromise security (or latency) for reducing processing overheads, but we should be mindful of it.
>> i agree, i am not sure if you want to relfect any of this in the charter and how
> I just picked up on it, because latency is specifically called out but processing overhead isn't. You could rephrase the first sentence as "The protocol extension must have acceptable latency and processing overheads."
>
>> - must allow client to avoid fingerprinting: some clients may want to avoid appearing as the same
>>>>   client when connecting to a remote peer on subsequent occasions.  This should either
>>>>   be the default (clients cannot be "fingerprinted" by the server based on shared state)
>>>>   or some mechanism should be available for clients to drop or ignore shared state to avoid
>>>>   being fingerprintable any more than would be present for a cleartext session.
>>> Not sure if this achievable if you can already fingerprint clients based on existing IP and TCP header fields.
>> right, but see the last part of the last sentence (added by joe) This protocol must not do things worse, makes sense?
> Makes sense. Suggest to express it this way, e.g., "the protocol extension must not increase the possibility for endpoint fingerprinting compared to what is possible already".
>
> Lars