[131209] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [p2p-hackers] IETF rejects Obfuscated TCP

daemon@ATHENA.MIT.EDU (Eric Rescorla)
Wed Aug 20 22:31:32 2008

Date: Wed, 20 Aug 2008 12:28:59 -0700
From: Eric Rescorla <ekr@networkresonance.com>
To: "Alex Pankratov" <ap@poneyhot.org>
Cc: "'Eric Rescorla'" <ekr@networkresonance.com>,
	"'theory and practice of decentralized computer networks'" <p2p-hackers@lists.zooko.com>,
	<cryptography@metzdowd.com>
In-Reply-To: <006a01c902f6$ebe5b500$c3b11f00$@org>

At Wed, 20 Aug 2008 11:59:48 -0700,
Alex Pankratov wrote:
> > May I ask what you're trying to accomplish? Recall that TLS doesn't
> > start until a TCP connection has been established, so there's
> > aready a proof of the round trip.
> > 
> > That said, a mechanism of this type has already been described
> > for DTLS (RFC 4347), so no new invention would be needed.
> 
> My comment was in a context of a thread discussing Obfuscated TCP.
> 
> One of the suggestions was to piggyback SSL handshake on TCP 
> handshake, to which someone pointed at an issue with SYN-flood 
> like DoS attacks. My response was to the latter comment.

Well, as I stated in the original discussion on obfuscated TCP (on
TCPM), I'm not convinced that the latency problem is that severe, and
if it is there are a number of potential performance improvements one
could make to TLS before one started screwing around with TCP.

-Ekr

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post