I've uploaded a draft on tls strong authentication deployment:
http://datatracker.ietf.org/doc/draft-malbrain-tls-strong-authentication
Any comments would be appreciated.
________________________________
From: Stephen Farrell <[email protected]>
To: =JeffH <[email protected]>
Cc: perpass <[email protected]>
Sent: Tuesday, September 17, 2013 2:10 AM
Subject: Re: [perpass] rough list of concrete stuff from list
Hi Jeff,
On 09/17/2013 02:45 AM, =JeffH wrote:
> Here's some items not as yet on the "rough list of concrete stuff"
> AFAICT, which perhaps should be, at least from a completeness
> perspective (YMMV)...
Maybe I need to clarify: I put stuff on that list where I
felt happy that I understood how the end result in the
IETF might look. Its not meant to be a complete list of
relevant stuff, nor most important stuff, just the stuff
that's already concrete enough that if it did end up in
an RFC, I reckon I understand more-or-less what'd be in
that and how we might get it done.
But those links do certainly look relevant and it'd be
good to see some discussion of them (in new threads
please).
I'll start one thread in a minute on tcpcrypt.
Cheers,
S.
>
> Background/Requirements/Opportunities..
>
> Adam Langley, 2009, W2SP. "Opportunistic Encryption Everywhere". W2SP.
> http://w2spconf.com/2009/papers/s1p2.pdf
>
> Andrea Bittau, et al. (2010-08-13). "The case for ubiquitous
> transport-level encryption". 19th USENIX Security Symposium.
> http://www.usenix.org/events/sec10/tech/full_papers/Bittau.pdf
>
> Opportunistic encryption (has list of various applicable projects)
> http://en.wikipedia.org/wiki/Opportunistic_encryption
>
> Linux FreeS/WAN Project - Opportunistic Encryption
> Henry Spencer, D. Hugh Redelmeier.
> http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/opportunism.spec
>
>
>
> examples..
>
> tcpcrypt
> http://en.wikipedia.org/wiki/Tcpcrypt
> https://tools.ietf.org/html/draft-bittau-tcp-crypt-03
>
>
> Obfuscated TCP
> http://en.wikipedia.org/wiki/Obfuscated_TCP
>
> [tcpm] Faster application handshakes with SYN/ACK payloads
> http://www.ietf.org/mail-archive/web/tcpm/current/msg03829.html
> http://tools.ietf.org/html/draft-agl-tcpm-sadata-01
>
> IETF rejects Obfuscated TCP (email thread on tcpm@)
> http://comments.gmane.org/gmane.network.peer-to-peer.p2p-hackers/2099
>
>
> freeS/WAN, Openswan, Libreswan et al.
> http://en.wikipedia.org/wiki/FreeS/WAN
>
>
>
>
> HTH,
>
> =JeffH
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass
>
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass