Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

Alfie John <alfiej@fastmail.fm> Wed, 20 August 2014 21:29 UTC

Return-Path: <alfiej@fastmail.fm>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F16121A87A3 for <tcpm@ietfa.amsl.com>; Wed, 20 Aug 2014 14:29:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xk0yBM3rGpjC for <tcpm@ietfa.amsl.com>; Wed, 20 Aug 2014 14:29:28 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAEE21A87CE for <tcpm@ietf.org>; Wed, 20 Aug 2014 14:29:24 -0700 (PDT)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.42]) by gateway2.nyi.internal (Postfix) with ESMTP id 838FE208CF for <tcpm@ietf.org>; Wed, 20 Aug 2014 17:29:23 -0400 (EDT)
Received: from web2 ([10.202.2.212]) by compute2.internal (MEProxy); Wed, 20 Aug 2014 17:29:23 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=fastmail.fm; h= message-id:from:to:cc:mime-version:content-transfer-encoding :content-type:reply-to:in-reply-to:references:subject:date; s= mesmtp; bh=pyTz7I8/TtHf/n7kwtkqEsg/XVA=; b=V//amL75aKLNRMyrM7MrS qJLhXlbxvTW0RF5yOD0KHOits3xnGcGggxJlLTv0WwUo5on4+6AVJG7+lfXgNtCr UVwo7YfdbqEBqmiD9mBo5b+h15uBbuACGipySDkbYBb+q4XYGXBUl2b27cPLIEIW deWY5rPa8IPVGq+2SXQgRU=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:from:to:cc:mime-version :content-transfer-encoding:content-type:reply-to:in-reply-to :references:subject:date; s=smtpout; bh=pyTz7I8/TtHf/n7kwtkqEsg/ XVA=; b=OdfcRs1eedmAZUMnlFaukoVBVxWjbWtxPBqtBXOatPnTtj2tMDt+8jKR HZC1FRh4yrApcwY/Fcd4smhbVngPpJTjyad8HBGKpe/5Olw5Wp5xJ5zVMXLdqCxq pYatvOguRq2+M2ywqDr7+3tC2xAi4xgrZ3W8PFhjP83n4Shv98A=
Received: by web2.nyi.internal (Postfix, from userid 99) id 58CEE5401DF; Wed, 20 Aug 2014 17:29:23 -0400 (EDT)
Message-Id: <1408570163.1317092.154976257.5364EFB1@webmail.messagingengine.com>
X-Sasl-Enc: Tq6K4t/X+MCh03VmqSrbOZbMfzzRWoneb1sQhsxOpFHI 1408570163
From: Alfie John <alfiej@fastmail.fm>
To: Jacob Appelbaum <jacob@appelbaum.net>, Florian Westphal <fw@strlen.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain
X-Mailer: MessagingEngine.com Webmail Interface - ajax-5f815d4c
In-Reply-To: <CAFggDF30285E3eYfUOR-2hwNkdFf7Jh_Q5d8A38MtOT4K_9gsA@mail.gmail.com>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com> <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com> <CAFggDF39L+kLQLmiWJR3q6suPOtYmKJiJUqp0kBv7GjUtNVOjA@mail.gmail.com> <20140819212351.GB11767@breakpoint.cc> <CAFggDF30285E3eYfUOR-2hwNkdFf7Jh_Q5d8A38MtOT4K_9gsA@mail.gmail.com>
Date: Wed, 20 Aug 2014 23:29:23 +0200
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/gHiVDXQ-wkWTMlINQgVbTP2SvjI
Cc: Christian Grothoff <christian@grothoff.org>, "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>, tcpinc@ietf.org, Joe Touch <touch@isi.edu>
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: alfiej@fastmail.fm
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 21:29:31 -0000

On Wed, Aug 20, 2014, at 03:43 PM, Jacob Appelbaum wrote:
> That is exactly what TCP Stealth aims to standardize.
>
> > Q: - But I cannot use portknocking because....?
> > A: - ?
> >
> > I tried to find explanation in draft-kirsch-ietf-tcp-stealth-00, but
> > did not find any.  It talks about "pitfalls" of applications trying
> > to "reimplement tcp in user space".  Perhaps there should be a
> > paragraph as to why ra
> >
>
> ...?

When you're on a network that filters everything but DNS, HTTP and
HTTPS, you don't have the option of port knocking.

Alfie

-- 
  Alfie John
  alfiej@fastmail.fm