Wow! If I wouldn't have looked at the header, I might think this is an IETF WG discussion. Except they usually don't have open running code like you have here.
Henry On 8/20/08 1:59 PM, "Alex Pankratov" <[EMAIL PROTECTED]> wrote: > > >> -----Original Message----- >> From: [EMAIL PROTECTED] [mailto:owner- >> [EMAIL PROTECTED] On Behalf Of Eric Rescorla >> Sent: August 20, 2008 10:31 AM >> To: Alex Pankratov >> Cc: 'theory and practice of decentralized computer networks'; >> [EMAIL PROTECTED] >> Subject: Re: [p2p-hackers] IETF rejects Obfuscated TCP > > [snip] > >> May I ask what you're trying to accomplish? Recall that TLS doesn't >> start until a TCP connection has been established, so there's >> aready a proof of the round trip. >> >> That said, a mechanism of this type has already been described >> for DTLS (RFC 4347), so no new invention would be needed. > > My comment was in a context of a thread discussing Obfuscated TCP. > > One of the suggestions was to piggyback SSL handshake on TCP > handshake, to which someone pointed at an issue with SYN-flood > like DoS attacks. My response was to the latter comment. > > Alex > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
