(changing the subject to match the thread)

On 7/30/2014 11:59 PM, Eggert, Lars wrote:
Hi,

On 2014-7-30, at 19:04, Joe Touch <[email protected]> wrote:
That goal is probably much more quickly and easily addressed by encouraging use 
of TLS (https, IMAP/POP with TLS, etc.), and encouraging servers to either get 
certificates signed by a known authority or at least self-signed.

using TLS requires changes to the application on both endpoints.

Yes. Using a TCP solution requires changes to the OS on both endpoints.

We have ample evidence that the former is easy to do and deploy in a widespread fashion - HTTPS, IMAP/POP with TLS, etc.

Having a solution inside TCP would protect apps that aren't protected, but by using "cleartext" port numbers we are also increasing the risk that those connections will be blocked by DPI devices.

My concerns are as follows:

        - this work is motivated by the desire for greater protection
        against pervasive monitoring

        - a solution to pervasive monitoring should not make the
        Internet more fragile or fragmented (IMO)

        - such monitoring is already inhibited by TLS

        - where TLS is blocked, I would expect a TCP or IP solution
        to also be blocked

If the sole goal is anti-monitoring, we have what we need.

I also fear that a TCP-based solution might present a misleading view that a session is E2E protected when a MITM acts as a TCPINC proxy; TLS already has well-established procedures by which users can examine a certificate and determine whether to trust it. Building that into an OS and integrating its management with the user application (esp. legacy apps) isn't going to be as intuitive.

Joe

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to