请输入您要查询的百科知识:

 

词条 Tcpcrypt
释义

  1. Description

  2. History

  3. Performance

  4. Implementations

  5. See also

  6. References

  7. External links

{{Lowercase title}}{{Infobox software
| name = Tcpcrypt
| title =
| logo =
| logo caption =
| screenshot =
| caption =
| collapsible =
| author = Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, Dan Boneh and Quinn Slack.
| developer =
| released =
| discontinued =
| latest release version =
| latest release date = {{Start date and age|2011|05|02|df=yes/no}}
| latest preview version =
| latest preview date =
| frequently updated =
| status =
| programming language =
| operating system =
| platform =
| size =
| language =
| language count =
| language footnote =
| genre = communication encryption protocol
| license =
| alexa =
| website = {{URL|http://tcpcrypt.org/}}
| standard =
| AsOf =
}}

In computer networking, tcpcrypt is a transport layer communication encryption protocol.[1][2] Unlike prior protocols like TLS (SSL), tcpcrypt is implemented as a TCP extension. It was designed by a team of six security and networking experts: Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, Dan Boneh and Quinn Slack.[3] Tcpcrypt has been published as an Internet Draft.[4] Experimental user-space implementations are available for Linux, Mac OS X, FreeBSD and Windows. There is also a Linux kernel implementation.

The TCPINC (TCP Increased Security) working group was formed in June 2014 by IETF to work on standardizing security extensions in the TCP protocol.[5]

Description

Tcpcrypt provides opportunistic encryption — if either side does not support this extension, then the protocol falls back to regular unencrypted TCP. Tcpcrypt also provides encryption to any application using TCP, even ones that do not know about encryption. This enables incremental and seamless deployment.[6]

Unlike TLS, tcpcrypt itself does not do any authentication, but passes a unique "session ID" down to the application; the application can then use this token for further authentication. This means that any authentication scheme can be used, including passwords or certificates. It also does a larger part of the public-key connection initiation on the client side, to reduce load on servers and mitigate DoS attacks.[6]

History

The first draft of the protocol specification was published in July 2010, with reference implementations following in August. However, after initial meetings in IETF, proponents of the protocol failed to gain traction for standardization and the project went dormant in 2011.[7]

In 2013 and 2014, following Edward Snowden's Global surveillance disclosures about the NSA and agencies of other governments, IETF took a strong stance for protecting Internet users against surveillance.[8][9] This aligns with tcpcrypt's goals of ubiquitous transparent encryption, which revived interest in standardization of the protocol. An official IETF mailing list was created for tcpcrypt in March 2014,[10] followed by the formation of the TCPINC (TCP Increased Security) working group in June[5] and a new version of the draft specification.

Performance

Tcpcrypt enforces TCP timestamps and adds its own TCP options to each data packet, amounting to 36 bytes per packet compared to plain TCP. With a mean observed packet size for TCP packets of 471 bytes,[11] this can lead to an overhead of 8% of useful bandwidth. This 36 bytes overhead may not be an issue for internet connections faster than 64kbs, but can be an issue for dial up internet users.

Compared to TLS/SSL, tcpcrypt is designed to have a lower performance impact. In part this is because tcpcrypt does not have built-in authentication, which can be implemented by the application itself. Cryptography primitives are used in such a way to reduce load on the server side, because a single server usually has to provide services for far more clients than reverse.[6]

Implementations

The current user space implementations are considered experimental and are reportedly unstable on some systems. It also does not support IPv6 yet, which is currently only supported by the Linux kernel version. It is expected that once tcpcrypt becomes a standard, operating systems will come with tcpcrypt support built-in, making the user space solution unnecessary.

See also

  • DTLS
  • IPsec
  • Obfuscated TCP – an earlier failed proposal for opportunistic TCP encryption

References

1. ^{{cite conference |author=Andrea Bittau|date=2010-08-13 |title=The case for ubiquitous transport-level encryption |publisher=19th USENIX Security Symposium |url=http://www.usenix.org/events/sec10/tech/full_papers/Bittau.pdf |display-authors=etal}}
2. ^{{cite news |author=Michael Cooney |date=2010-07-19 |title=Is ubiquitous encryption technology on the horizon? |url=http://www.networkworld.com/community/node/63871 |publisher=Network World }}
3. ^{{cite web |title=tcpcrypt – About us |publisher=tcpcrypt.org |url=http://tcpcrypt.org/aboutus.php }}
4. ^{{cite IETF |title= Cryptographic protection of TCP Streams (tcpcrypt) |draft=draft-bittau-tcpinc-01 |last=Bittau |first=A. |author2=D. Boneh |author3=M. Hamburg |author4=M. Handley |author5=D. Mazieres |author6=Q. Slack |date=21 July 2014 |publisher=IETF }}
5. ^{{cite web |title=TCP Increased Security (tcpinc) |work=Charter for Working Group |accessdate={{date|2014-07-25}} |url=https://datatracker.ietf.org/wg/tcpinc/charter/ }}
6. ^{{cite news |author=Jake Edge |date=2010-08-25 |title=Transport-level encryption with Tcpcrypt |publisher=LWN.net |url=https://lwn.net/Articles/401943/ }}
7. ^{{cite mailing list |author=Mark Handley |date={{date|2013-09-09}} |title=Kernel patch for Linux 3.10.10? |quote=Two years ago we failed to get much traction for the takeup of tcpcrypt. |url=https://mailman.stanford.edu/pipermail/tcpcrypt-dev/2013-September/000047.html }}
8. ^{{cite news |author=Richard Chirgwin |date={{date|2014-05-14}} |title=IETF plans to NSA-proof all future internet protocols |publisher=The Register |url=https://www.theregister.co.uk/2014/05/14/ietf_documents_start_of_its_privacy_battle/ }}
9. ^{{cite news |author=Mark Jackson |date={{date|2014-05-13}} |title=IETF Commits to Hamper State Sponsored Mass Internet Surveillance |publisher=ISP Review |url=http://www.ispreview.co.uk/index.php/2014/05/ietf-commits-hamper-state-sponsored-mass-internet-surveillance.html }}
10. ^{{cite mailing list |title=New Non-WG Mailing List: Tcpcrypt -- Discussion list for adding encryption to TCP |date={{date|2014-03-24}} |publisher=IETF Secretariat |url=http://www.ietf.org/mail-archive/web/tcpcrypt/current/msg00000.html }}
11. ^{{cite web |title=Trends in Wide Area IP Traffic Patterns A View from Ames Internet Exchange|author="Sean McCreary and kc klaffy"|url=http://www.caida.org/publications/papers/2000/AIX0005/}}

External links

  • tcpcrypt.org
  • [https://datatracker.ietf.org/wg/tcpinc/charter/ TCPINC Working Group Charter at IETF]
  • Slides from USENIX 2010 presentation, explaining basics of tcpcrypt
{{VPN}}

3 : Transmission Control Protocol|Computer network security|Cryptographic protocols

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 11:04:44