On 30 July 2014 10:25, Daniel Kahn Gillmor <d...@fifthhorseman.net> wrote:
> saying "optional protection" implies a bunch of complexity that bears on
> interoperability and negotiation issues; those really need to be nailed
> down to be evaluated properly.

One of those pieces of complexity is the handling of failures.
Obviously, there is no benefit to having protection if you do nothing
when someone has messed with your segments.

I see two potential failure paths here: in one, hosts adaptively
respond to damage by reducing what is protected.  That is in line with
the opportunistic nature of the mechanism, but it allows an attacker
to erode any optional protections.  The other failure mode is where
you kill the connection in response to modifications, and we thereby
create a disincentive to deploy tcpinc.

_______________________________________________
Tcpinc mailing list
Tcpinc@ietf.org
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to