[<prev] [next>] [day] [month] [year] [list]
Message-ID: <366b6d83-ed54-48aa-9bbb-8768de50c88e@lja.fi>
Date: Mon, 5 Jan 2026 10:43:54 +0200
From: Lauri Jakku <lja@....fi>
To: john.fastabend@...il.com, kuba@...nel.org, sd@...asysnail.net,
netdev@...r.kernel.org
Subject: Re: Totally new module addition for Linux-tree
Hi All,
Hope this now is the right place :) .. I was wondering to get the STCP
into Linux-tree?
--Lauri Jakku
Xin Long kirjoitti 19.12.2025 klo 19.33:
> On Fri, Dec 19, 2025 at 2:53 AM Lauri Jakku <lja@....fi> wrote:
>> Hi Marcelo & Lucien,
>>
>> I've developed rust-kernel module, that adds security layer over TCP
>> connection, that can be used as replacement for any TCP connection, by
>> creating socket with IPPROTO_STCP from IPPROTO_TCP.
>>
>> The module then will do elliptic handshake + payload is AES (256bit)
>> encrypted & decrypted to/from wire. The protocol users might be IoT
>> devices and such.
>>
>> I've implemented the protocol in user-space also, but the module would
>> enable anything to be secured with protocol number change => no need to
>> implement all the userspace stuff per application. The protocol uses TCP
>> as transport layer, and hooks handle the elliptic handshake + AES
>> en/decryption ...
>>
>> The module is made of C & Rust, C code is delegating hooks to Rust and
>> it would be totally new addition to Linux-tree, there is no existing
>> implementation.
>>
>> The code is now in github,
>> https://github.com/MiesSuomesta/STCP/tree/main/kernel/OOT/linux
>>
>> What do you say?
> Hi Lauri,
>
> I think Andrew mixed STCP with SCTP.
> STCP looks similar to TLS/TCP, you may check with kTLS maintainers:
>
> NETWORKING [TLS]
> M: John Fastabend <john.fastabend@...il.com>
> M: Jakub Kicinski <kuba@...nel.org>
> M: Sabrina Dubroca <sd@...asysnail.net>
> L: netdev@...r.kernel.org
>
> Thanks.
>>
>> --Lauri J / Pori, Finland
>>
>> Andrew Morton kirjoitti 19.12.2025 klo 1.51:
>>> On Thu, 18 Dec 2025 12:41:21 +0300 Lauri Jakku <lja@....fi> wrote:
>>>
>>>> Hi,
>>>>
>>>> I've developed STCP (Secure TCP) protocol witch I'd like to get into
>>>> the official Linux kernel.
>>>>
>>> Thanks.
>>>
>>> I suggest you read
>>> Documentation/process/submitting-patches.rst
>>> Documentation/process/submit-checklist.rst
>>>
>>> then check the SCTP record in MAINTAINERS
>>>
>>> then send the patchset to
>>>
>>> Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
>>> Xin Long <lucien.xin@...il.com>
>>> linux-sctp@...r.kernel.org
>>> netdev@...r.kernel.org
>>>
>>> good luck!
>> .---<[ Paxsudos IT / Security Screening
>> ]>---------------------------------------------------------------->
>> | Known viruses: 3626914
>> | Engine version: 1.4.3
>> | Scanned directories: 0
>> | Scanned files: 1
>> | Infected files: 0
>> | Data scanned: 0.00 MB
>> | Data read: 0.00 MB (ratio 1.00:1)
>> | Time: 10.845 sec (0 m 10 s)
>> | Start Date: 2025:12:19 09:53:32
>> | End Date: 2025:12:19 09:53:42
>> | SPAM hints: []
>> | SPAM hints: []
>> | Message not from DMARC.
>> `-------------------------------------------------------------------->
> .---<[ Paxsudos IT / Security Screening
> ]>---------------------------------------------------------------->
> | Known viruses: 3626914
> | Engine version: 1.4.3
> | Scanned directories: 0
> | Scanned files: 1
> | Infected files: 0
> | Data scanned: 0.00 MB
> | Data read: 0.00 MB (ratio 1.00:1)
> | Time: 10.773 sec (0 m 10 s)
> | Start Date: 2025:12:19 18:34:09
> | End Date: 2025:12:19 18:34:20
> | SPAM hints: []
> | SPAM hints: []
> | Message not from DMARC.
> `-------------------------------------------------------------------->
.---<[ Paxsudos IT / Security Screening ]>---------------------------------------------------------------->
| Known viruses: 3627110
| Engine version: 1.4.3
| Scanned directories: 0
| Scanned files: 1
| Infected files: 0
| Data scanned: 0.00 MB
| Data read: 0.00 MB (ratio 1.00:1)
| Time: 12.995 sec (0 m 12 s)
| Start Date: 2026:01:05 10:43:55
| End Date: 2026:01:05 10:44:08
| SPAM hints: []
| SPAM hints: []
| Message not from DMARC.
`-------------------------------------------------------------------->
Powered by blists - more mailing lists