- From: Nico Williams <nico@cryptonector.com>
- Date: Fri, 2 Aug 2013 16:15:58 -0500
- To: Poul-Henning Kamp <phk@phk.freebsd.dk>
- Cc: "Scharf, Michael (Michael)" <michael.scharf@alcatel-lucent.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>, "tcpm@ietf.org" <tcpm@ietf.org>
On Fri, Aug 2, 2013 at 3:56 PM, Poul-Henning Kamp <phk@phk.freebsd.dk> wrote: > In message <655C07320163294895BBADA28372AF5D07CBF8@FR712WXCHMBA15.zeu.alcatel-l > ucent.com>, "Scharf, Michael (Michael)" writes: > >>As mentioned today on the mic, the TCPM working group has a working group >>item that allows data to be carried in the SYN and SYN-ACK packets and that >>is consumed by the receiving end during the initial connection handshake, > > Uhm, didn't we try that once with TTCP only to find out that it > opened a major DoS hole ? This one is different. You must have done one normal exchange and exchange "key material" (cached on both ends, free to fall off the cache at any time) to be used for fast opens. Nico --
Received on Friday, 2 August 2013 21:16:22 UTC