Wow! 

If I wouldn't have looked at the header, I might think this is an IETF WG
discussion. Except they usually don't have open running code like you have
here.

Henry


On 8/20/08 1:59 PM, "Alex Pankratov" <[EMAIL PROTECTED]> wrote:

> 
> 
>> -----Original Message-----
>> From: [EMAIL PROTECTED] [mailto:owner-
>> [EMAIL PROTECTED] On Behalf Of Eric Rescorla
>> Sent: August 20, 2008 10:31 AM
>> To: Alex Pankratov
>> Cc: 'theory and practice of decentralized computer networks';
>> [EMAIL PROTECTED]
>> Subject: Re: [p2p-hackers] IETF rejects Obfuscated TCP
> 
> [snip]
> 
>> May I ask what you're trying to accomplish? Recall that TLS doesn't
>> start until a TCP connection has been established, so there's
>> aready a proof of the round trip.
>> 
>> That said, a mechanism of this type has already been described
>> for DTLS (RFC 4347), so no new invention would be needed.
> 
> My comment was in a context of a thread discussing Obfuscated TCP.
> 
> One of the suggestions was to piggyback SSL handshake on TCP
> handshake, to which someone pointed at an issue with SYN-flood
> like DoS attacks. My response was to the latter comment.
> 
> Alex
> 
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to