[tcpm] Matthew J Zekauskas: TCPM minutes, IETF70, edited version

Mark Allman <mallman@icir.org> Wed, 02 January 2008 19:07 UTC

Return-path: <tcpm-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1JA8wF-000072-Mb; Wed, 02 Jan 2008 14:07:39 -0500
Received: from tcpm by megatron.ietf.org with local (Exim 4.43) id 1JA8wE-00006x-TX for tcpm-confirm+ok@megatron.ietf.org; Wed, 02 Jan 2008 14:07:38 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1JA8wE-00006p-0E for tcpm@ietf.org; Wed, 02 Jan 2008 14:07:38 -0500
Received: from pork.icsi.berkeley.edu ([192.150.186.19]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1JA8wB-00081s-Bp for tcpm@ietf.org; Wed, 02 Jan 2008 14:07:37 -0500
Received: from guns.icir.org (adsl-69-222-35-58.dsl.bcvloh.ameritech.net [69.222.35.58]) by pork.ICSI.Berkeley.EDU (8.12.11.20060308/8.12.11) with ESMTP id m02J7XQx018330 for <tcpm@ietf.org>; Wed, 2 Jan 2008 11:07:33 -0800
Received: from lawyers.icir.org (adsl-69-222-35-58.dsl.bcvloh.ameritech.net [69.222.35.58]) by guns.icir.org (Postfix) with ESMTP id 9BD2713B43CE for <tcpm@ietf.org>; Wed, 2 Jan 2008 14:07:27 -0500 (EST)
Received: from lawyers.icir.org (localhost [127.0.0.1]) by lawyers.icir.org (Postfix) with ESMTP id 547C93263F1 for <tcpm@ietf.org>; Wed, 2 Jan 2008 14:06:37 -0500 (EST)
To: tcpm@ietf.org
From: Mark Allman <mallman@icir.org>
Organization: International Computer Science Institute (ICSI)
Song-of-the-Day: And We Danced
MIME-Version: 1.0
Date: Wed, 02 Jan 2008 14:06:37 -0500
Message-Id: <20080102190637.547C93263F1@lawyers.icir.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 312bb437839230b5894c6b1686dbca1d
Subject: [tcpm] Matthew J Zekauskas: TCPM minutes, IETF70, edited version
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: mallman@icir.org
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1496189814=="
Errors-To: tcpm-bounces@ietf.org

Matt sent these to us, but then noted he should have copied the list.
Please send corrections soon.  The final version is due Friday, I
believe.

allman




--- Begin Message ---
Here's a version of the TCPM minutes I think is suitable for posting,
and getting general comments...

I've attached it as text.

Joe: the audio cut out on the discussion that begins "There was a
question about the use of option types" -- I'm not sure fully caught the
gist of the discussion, so you might want to review it.  Actually, I'll
duplicate it here:

  There was a question about the use of option types.  Joe said we could
  use a single option type, which the security association would encode
  (if you didn't have the right algorithm, you could not verify the
  stream).  The reason for multiple option types is that it is clear
  when we change the MAC; it's really mostly for the human beings, so
  that they note we are switching to something completely different.
  Sandy noted that it's also easier for humans to write the
  implementation.  Joe said that it wasn't strictly necessary, though.
  We are not going to use the MD5 hash as a viable algorithm for
  TCP-AUTH.  Thus, the hash would never generate a result that would
  collide with something else.


Thanks,

--Matt
--- End Message ---
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm