[tcpinc] New TCP-ENO draft released

dm-list-tcpcrypt@scs.stanford.edu Fri, 11 September 2015 14:45 UTC

Return-Path: <dm-list-tcpcrypt@scs.stanford.edu>
X-Original-To: tcpinc@ietfa.amsl.com
Delivered-To: tcpinc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CF5F1B4067 for <tcpinc@ietfa.amsl.com>; Fri, 11 Sep 2015 07:45:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.79
X-Spam-Level: *
X-Spam-Status: No, score=1.79 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7NRQBqHXL6au for <tcpinc@ietfa.amsl.com>; Fri, 11 Sep 2015 07:45:03 -0700 (PDT)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 015DF1B3F2B for <tcpinc@ietf.org>; Fri, 11 Sep 2015 07:45:02 -0700 (PDT)
Received: from market.scs.stanford.edu (localhost.scs.stanford.edu [127.0.0.1]) by market.scs.stanford.edu (8.14.7/8.14.7) with ESMTP id t8BEj2HP008371 for <tcpinc@ietf.org>; Fri, 11 Sep 2015 07:45:02 -0700 (PDT)
Received: (from dm@localhost) by market.scs.stanford.edu (8.14.7/8.14.7/Submit) id t8BEj22r008532; Fri, 11 Sep 2015 07:45:02 -0700 (PDT)
X-Authentication-Warning: market.scs.stanford.edu: dm set sender to dm-list-tcpcrypt@scs.stanford.edu using -f
From: dm-list-tcpcrypt@scs.stanford.edu
To: tcpinc <tcpinc@ietf.org>
Date: Fri, 11 Sep 2015 07:45:02 -0700
Message-ID: <87wpvxm2vl.fsf@ta.scs.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpinc/BAcH5wEyrnzC5jbrBspq8G93UoM>
Subject: [tcpinc] New TCP-ENO draft released
X-BeenThere: tcpinc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: David Mazieres expires 2015-12-10 PST <mazieres-ac96tftp9zfhvbdgcygf2d7yf2@temporary-address.scs.stanford.edu>
List-Id: "Discussion list for adding encryption to TCP." <tcpinc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpinc/>
List-Post: <mailto:tcpinc@ietf.org>
List-Help: <mailto:tcpinc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Sep 2015 14:45:04 -0000

Hi, everyone.  We've released a new draft of TCP-ENO, available in the
usual place:

        https://datatracker.ietf.org/doc/draft-bittau-tcpinc-tcpeno/

In this draft, we've tried to address all of the feedback we received on
the list.  Some suggestions we incorporated directly.  In particular:

 * The requirement for 128-bit security was softened to prohibit
   "substantially less than 128-bit security."

 * The forward secrecy requirement was rephrased to require "forward
   secrecy some bounded, short time after the close of a TCP
   connection."

 * One of the application-aware settings is now reserved, to avoid
   confusion over two different values.

 * Language was added stating that applications SHOULD treat the session
   ID as a monolithic opaque value.  Other bytes have to be
   computationally indistinguishable from random.

 * The description of simultaneous open was clarified/corrected to
   retransmit the ENO option in case one of the original SYNs is lost.

On other issues, where we couldn't determine consensus on the list, we
added discussion to an Open Issues section, to ensure that we do not
lose track of these issues.  In particular, there are now subsections
on:

 * Simultaneous open design points.
 * Whether there should be multiple and secret session IDs 
 * Whether each suboption should have a length byte

I hope this addresses or at least acknowledges most of the major issues
people have raised on the list.

David