On 8/1/2014 12:41 PM, Nico Williams wrote:
On Fri, Aug 1, 2014 at 8:56 AM, Rene Struik <[email protected]> wrote:
This seems to make lots of sense: specifying the scope of which data is to
be encrypted and which is to be encrypted and authenticated with a specific
key and AEAD scheme should only occupy a few paragraphs and can be specified
almost independently from schemes as to how to arrive at the shared key. So,
time is best spent being creative on the latter now.

Well, obviously the entire ordered octet data stream (wither PSH?
URG?) needs protection,

Yes.

as does FIN handshaking

Why? Again, if this is to protect confidentiality, the control plane of TCP isn't relevant.

and RST.

We've already discussed the limitations of this; it can be done during an active connection, but needs to be 'weakened' for inactive ones or TCP state can't be cleaned up (or we need to make TCP persistence the default).

Port
numbers, for example, are of relatively little interest to protect (if
no peer authentication is afforded).

We can't hide the client source ports for NAT traversal.

We can't hide the server ports or we'll interfere reverse-NAT traversals.

I.e., some parts of the connection are open to the world - who we're talking to and on what ports.

(note - this doesn't address what we protect from tampering, but tampering doesn't seem to be the key focus).

> TCP options are of interest,
mostly in so far as protecting them may (or may not) be necessary to
protect the data stream.

"protect" from what? Again, if this is all focused on anti-tracking, options aren't relevant.

Joe


Nico
--

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc


_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to