Re: [tcpm] TCP port names option ID

Joe Touch <touch@ISI.EDU> Mon, 17 April 2006 15:19 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FVVVO-0000IB-DT; Mon, 17 Apr 2006 11:19:10 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FVVVN-0000I6-0V for tcpm@ietf.org; Mon, 17 Apr 2006 11:19:09 -0400
Received: from vapor.isi.edu ([128.9.64.64]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVVVL-0003UF-Lk for tcpm@ietf.org; Mon, 17 Apr 2006 11:19:08 -0400
Received: from [192.168.1.47] (pool-71-106-130-244.lsanca.dsl-w.verizon.net [71.106.130.244]) by vapor.isi.edu (8.11.6p2+0917/8.11.2) with ESMTP id k3HFIdR16234; Mon, 17 Apr 2006 08:18:39 -0700 (PDT)
Message-ID: <4443B1C6.6000400@isi.edu>
Date: Mon, 17 Apr 2006 08:18:30 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 1.5 (Windows/20051201)
MIME-Version: 1.0
To: weddy@grc.nasa.gov
Subject: Re: [tcpm] TCP port names option ID
References: <E1FUxpf-00042o-00@alva.home> <20060417133416.GA13465@grc.nasa.gov>
In-Reply-To: <20060417133416.GA13465@grc.nasa.gov>
X-Enigmail-Version: 0.94.0.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Cc: tcpm <tcpm@ietf.org>, Tim Shepard <shep@alum.mit.edu>
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org



Wesley Eddy wrote:
> On Sat, Apr 15, 2006 at 11:21:51PM -0400, Tim Shepard wrote:
>> What about the TCP Sack-Permitted Option which is 2 bytes long?  (And
>> is very common on TCP SYN packets these days.)  If you add that to the
>> list, we're down to 3 bytes for the NAMESTRING, which is only one byte
>> more than the 16-bit port number that we started with.
>>
>> In any case, it seems if we go forward with this, it will be the last
>> option we can add to the TCP SYN packet without breaking something, as
>> we will have (in some cases) completely used up all space for a TCP
>> option.  So before we go forward with this, we should make sure we
>> really want to do that.
>>
> 
> Or reconsider things like:
> http://www.potaroo.net/ietf/all-ids/draft-kohler-tcpm-extopt-00.txt
> or
> http://www.potaroo.net/ietf/all-ids/draft-eddy-tcp-loo-03.txt

Those might be useful, but as portnames notes, this is an issue ONLY for
SYNs containing the TCP/MD5 or other TCP-level authentication options.

IF we move forward with TCP-level security for anything other than
routing protocols as a stop-gap until IPsec is used, perhaps, but only
in that case, IMO.

Joe


_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm