On 7/28/2014 9:35 AM, Stephen Farrell wrote:


On 28/07/14 17:29, David Mazieres wrote:
...
The reason it's useful to get this on the table early is that in the
abstract not all protocols are capable of producing a session ID with
the appropriate properties.  In particular, the session ID must be
unique over all time with overwhelming probability even if one end of
the connection is malicious.  As an example, I believe TLS could not do
this in the pre-RFC5929 days.

Right. So tcpcrypt and TLS based stuff can clearly do that. I'm
very unclear about Joe's proposal in that respect,

The current doc had not presented that information separately.

I'm assuming it would be the tuple of:
        - non-changing TCP socket info (e.g., excepting the client-side
        source IP and port info, for NAT traversal)
        - the ISN pair
        - the D-H nonce pair

But please don't take that as chiseled in stone; it's just my first thoughts on this.

Joe

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to