Re: [tcpm] [multipathtcp] new tcpcrypt draft available

Joe Touch <touch@isi.edu> Mon, 17 February 2014 19:19 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7E2C1A04ED; Mon, 17 Feb 2014 11:19:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.748
X-Spam-Level:
X-Spam-Status: No, score=-4.748 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.548] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SLq0iRlF9qKu; Mon, 17 Feb 2014 11:19:42 -0800 (PST)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by ietfa.amsl.com (Postfix) with ESMTP id ACC761A03DB; Mon, 17 Feb 2014 11:19:42 -0800 (PST)
Received: from [192.168.1.97] (pool-71-105-87-112.lsanca.dsl-w.verizon.net [71.105.87.112]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id s1HJIkVW026468 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 17 Feb 2014 11:18:56 -0800 (PST)
References: <CABu4T3+JhOs7xwvqQW=2wVkOjMUFt-w-grzB4p2+XQY-POd59Q@mail.gmail.com> <20140217115552.GD4609@cpaasch-mac> <655C07320163294895BBADA28372AF5D1E91AA@FR712WXCHMBA15.zeu.alcatel-lucent.com> <BD1C50C0-92CC-46D6-AC04-1FFDB3D65C66@isi.edu> <20140217190812.GC5650@cpaasch-mac>
In-Reply-To: <20140217190812.GC5650@cpaasch-mac>
Mime-Version: 1.0 (1.0)
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="us-ascii"
Message-Id: <128BA48D-958A-427D-B0B8-60E4A6155718@isi.edu>
X-Mailer: iPhone Mail (11B554a)
From: Joe Touch <touch@isi.edu>
Date: Mon, 17 Feb 2014 11:18:45 -0800
To: Christoph Paasch <christoph.paasch@uclouvain.be>
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/BiyZnWMTGj4D9Da0JWkLt4_b8Sk
Cc: "multipathtcp@ietf.org" <multipathtcp@ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
Subject: Re: [tcpm] [multipathtcp] new tcpcrypt draft available
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2014 19:19:45 -0000

> On Feb 17, 2014, at 11:08 AM, Christoph Paasch <christoph.paasch@uclouvain.be> wrote:
> 
>> On 17/02/14 - 10:13:36, Joe Touch wrote:
>> FYI that trick was discussed for multipath tcp.  See their archives goe
>> the reasons this isn't a good approach.
> 
> Oh indeed - I realize that the tcpcrypt draft mandates the MAC on every
> packet (even on empty acknowledgments).
> 
> If the MAC would only be used on packets with data, then it would have been fine.

Star the multipath archives. That still won't work. 

> 
> The problem for MPTCP was (if I remember correctly from the archives) because a
> zero-window announcment would prevent acknowledgments on the return-path.
> 
> 
> 
> I think there is a second point of discussion for tcpcrypt:
> 
> Is it really worth to enforce the MAC on non-data segments?
 
If not you're using TLS. Securing the control bits ought to be equally important, though I have other problems with this draft
Joe

> 
> 
> Cheers,
> Christoph
> 
> 
>>> On Feb 17, 2014, at 4:06 AM, "Scharf, Michael (Michael)"
>>> <michael.scharf@alcatel-lucent.com> wrote:
>>> 
>>> FYI - this could matter to tcpm as well
>>> 
>>>> -----Original Message----- From: multipathtcp
>>>> [mailto:multipathtcp-bounces@ietf.org] On Behalf Of Christoph Paasch
>>>> Sent: Monday, February 17, 2014 12:56 PM To: Andrea Bittau Cc:
>>>> multipathtcp@ietf.org Subject: Re: [multipathtcp] new tcpcrypt draft
>>>> available
>>>> 
>>>> Hello Andrea,
>>>> 
>>>>> On 16/02/14 - 14:54:18, Andrea Bittau wrote: For those interested, we
>>>>> posted a revised version of the tcpcrypt draft (opportunistic TCP
>>>>> encryption):
>>>>> 
>>>>> http://www.ietf.org/id/draft-bittau-tcp-crypt-04.txt
>>>>> 
>>>>> This will be discussed on Monday morning in tcpm, at the end of
>>>>> Session 1 (09:00--11:30).
>>>>> 
>>>>> All comments are welcome, including any points that you'd like us to
>>>>> address in our presentation.
>>>> 
>>>> I think it would be important to consider moving the MAC from the TCP
>>>> options space to the payload (similar to an SSL-record) to allow
>>>> support for TSO and segment splitting middleboxes and to avoid using up
>>>> all the TCP option space.
>>>> 
>>>> 
>>>> Cheers, Christoph
>>>> 
>>>> _______________________________________________ multipathtcp mailing
>>>> list multipathtcp@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/multipathtcp
>>> 
>>> _______________________________________________ multipathtcp mailing
>>> list multipathtcp@ietf.org
>>> https://www.ietf.org/mailman/listinfo/multipathtcp
>> 
>> _______________________________________________ tcpm mailing list
>> tcpm@ietf.org https://www.ietf.org/mailman/listinfo/tcpm