Hi,
On 2017-11-29, at 1:26, Brian Trammell (IETF) wrote:
> There are three possible states for an ECN negotiation: not attempted,
> failed, and succeeded. Each of these can add a fractional bit of information
> about the client and server TCP implementations. If a server negotiates ECN,
> you
.@ietf.org] On Behalf Of Eggert, Lars
> Sent: Monday, November 27, 2017 3:12 AM
> To: MORTON, ALFRED C (AL)
> Cc: QUIC WG ; tsv-area@ietf.org
> Subject: Re: Spin bit discussion - where we're at
>
> Hi,
>
> On 2017-11-26, at 20:26, MORTON, ALFRED C (AL) wrote:
>
November 27, 2017 3:12 AM
To: MORTON, ALFRED C (AL)
Cc: QUIC WG ; tsv-area@ietf.org
Subject: Re: Spin bit discussion - where we're at
Hi,
On 2017-11-26, at 20:26, MORTON, ALFRED C (AL)
mailto:acmor...@att.com>> wrote:
Question: Is there a privacy analysis of present ECN availabl
Hi,
On 2017-11-26, at 20:26, MORTON, ALFRED C (AL) wrote:
> Question: Is there a privacy analysis of present ECN available?
> (a search yielded many results with Missing: privacy)
not that I'm aware of; CC'ing tsv-area@ for some broader input.
(On first glance, the - user - privacy aspects here