On 07/30/2014 01:15 PM, Kevin Glavin wrote:
> The linked document [1] provides data around the deployment of middleboxes
> in enterprise networks.  Its does not provide a complete picture of the
> internet at large but for a population of tcp users both inside the
> enterprise and originating inside the enterprise and terminating outside
> it may provide some quantitate data to use in the "middle box traversal
> support" discussion.
> 
> Kevin
> 
> [1]   A Survey of Enterprise Middlebox Deployments
> Justine Sherry and Sylvia Ratnasamy
> EECS Department
> University of California, Berkeley
> http://www.eecs.berkeley.edu/Pubs/TechRpts/2012/EECS-2012-24.html

This document describes size, maintenance, and lifecycle concerns around
middleboxes on enterprise networks.  But it doesn't describe the
behavior of specific middleboxes, which is the relevant bit for this
discussion.

middleboxes that are willing to let encrypted traffic pass unmolested,
and that don't strip TCP options, aren't a problem for tcpinc.

We know that middleboxes exist; what we won't know without more
measurements is what sort of damage they will inflict on adopters of any
of the proposed forms of tcpinc.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to