Re: [TLS] Comments on draft-ietf-tls-sni-encryption-01.txt

2018-02-22 Thread R du Toit
I see at least 6 classes of "middlebox": 1. Inline corporate device (e.g. proxy); explicitly trusted by client through configuration. 2. Inline lawful intercept surveillance device; the client is not aware that it is "trusting" the device.  (NOTE: I'm not commenting on whether this is ethical,

Re: [TLS] Comments on draft-ietf-tls-sni-encryption-01.txt

2018-02-22 Thread Christian Huitema
On 2/21/2018 3:31 PM, R du Toit wrote: > I have analyzed the two mechanisms proposed in the draft, with > specific focus on the impact of middleboxes.  > >   > > *_Assumptions:_*** > > The middlebox is deployed inline, between the client and the fronting > server, and is allowed to intercept TLS s