| ▲ | zamadatix 8 months ago | ||||||||||||||||
Very interesting! It's like the best of the fragment-pre-encrypt world (everything appears as single packet 5 tuples to middleboxes) and fragment-post-encrypt world (transported packet data remains untouched) debate seen on IPsec deployments. Like you mention you could do this under QUIC but then you'd be hamstrung to some of the design mandates such as encryption. This is way better as it's just datagrams doing your one goal - hiding that you're transporting fragments. | |||||||||||||||||
| ▲ | ay 8 months ago | parent [-] | ||||||||||||||||
Yeah, that was precisely the set of trade offs :-) OTOH, I heard folks calling to banish the “no messing with a flow within 5-tuple” principle, so my hack may not have an overly long shelf life. | |||||||||||||||||
| |||||||||||||||||