Re: [tcpinc] TCP-ENO: Encryption Negotiation Option

Joe Touch <touch@isi.edu> Tue, 04 August 2015 17:34 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpinc@ietfa.amsl.com
Delivered-To: tcpinc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 983961A88F2 for <tcpinc@ietfa.amsl.com>; Tue, 4 Aug 2015 10:34:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0x4huN0kaVUC for <tcpinc@ietfa.amsl.com>; Tue, 4 Aug 2015 10:34:04 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83CF11A88E6 for <tcpinc@ietf.org>; Tue, 4 Aug 2015 10:34:04 -0700 (PDT)
Received: from [128.9.184.236] ([128.9.184.236]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id t74HXf0i027935 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 4 Aug 2015 10:33:42 -0700 (PDT)
To: tcpinc <tcpinc@ietf.org>
References: <87k2thxoxw.fsf@ta.scs.stanford.edu> <CABkgnnUsQ16zYykjYYzwig-1G1Pz3pgx9tRHyy8zPZ=3wmanog@mail.gmail.com> <87k2tge38n.fsf@ta.scs.stanford.edu> <87k2tge38n.fsf@ta.scs.stanford.edu>
From: Joe Touch <touch@isi.edu>
Message-ID: <55C0F774.2090007@isi.edu>
Date: Tue, 04 Aug 2015 10:33:40 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <87k2tge38n.fsf@ta.scs.stanford.edu>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: t74HXf0i027935
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpinc/fTJMejoIwUz_i_V1fvTUnbfEm44>
Cc: touch@isi.edu
Subject: Re: [tcpinc] TCP-ENO: Encryption Negotiation Option
X-BeenThere: tcpinc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpinc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpinc/>
List-Post: <mailto:tcpinc@ietf.org>
List-Help: <mailto:tcpinc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2015 17:34:06 -0000

> A simpler design would mimic ALPN.  The initial SYN, would include a list
> of options. The SYN+ACK would contain the selected option. A single octet
> each should suffice for the option. tcpcrypt would need but a single
> codepoint, as would tcp-use-tls.

If you have a TCP option codepoint for ENO you shouldn't need any
others. The rest of the parameters - including which mechanism is used -
should be part of the negotiation inside the option.

Joe