[131208] in cryptography@c2.net mail archive
RE: [p2p-hackers] IETF rejects Obfuscated TCP
daemon@ATHENA.MIT.EDU (Alex Pankratov)
Wed Aug 20 22:30:48 2008
From: "Alex Pankratov" <ap@poneyhot.org>
To: "'Eric Rescorla'" <ekr@networkresonance.com>
Cc: "'theory and practice of decentralized computer networks'" <p2p-hackers@lists.zooko.com>,
<cryptography@metzdowd.com>
In-Reply-To: <20080820173117.54A2C54AC47@kilo.rtfm.com>
Date: Wed, 20 Aug 2008 11:59:48 -0700
> -----Original Message-----
> From: owner-cryptography@metzdowd.com [mailto:owner-
> cryptography@metzdowd.com] On Behalf Of Eric Rescorla
> Sent: August 20, 2008 10:31 AM
> To: Alex Pankratov
> Cc: 'theory and practice of decentralized computer networks';
> cryptography@metzdowd.com
> Subject: Re: [p2p-hackers] IETF rejects Obfuscated TCP
[snip]
> May I ask what you're trying to accomplish? Recall that TLS doesn't
> start until a TCP connection has been established, so there's
> aready a proof of the round trip.
>
> That said, a mechanism of this type has already been described
> for DTLS (RFC 4347), so no new invention would be needed.
My comment was in a context of a thread discussing Obfuscated TCP.
One of the suggestions was to piggyback SSL handshake on TCP
handshake, to which someone pointed at an issue with SYN-flood
like DoS attacks. My response was to the latter comment.
Alex
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com