I must admit that I mostly agree with Stephan that this kind of thing should not exist. However, it exists now, and the chairs have decided we should at least discuss it.

I think there are many ways to meet the "requirements" of network monitoring and protocol debugging, and some are worse than others. Leading the world in the direction of the least damaging ones seems to be the bese way to deal with a bad situation.

The major threats I see include:

  Coerced use by oppressive governments.

  Use outside the immediate private network

  Use by an ISP on its customers

  Use without both ends being aware that it is in use.

I think coerced use is by oppressive governments is an obvious bad and I hope I have working group agreement on this point.

Limiting the protocol to the immediate private network will prevent 3rd parties from activating it to spy on the enterprise. One possible way to enforce this limitation is to require compliant implementations to limit broadcast of decryption information to the IP addresses on the local subnet.

I would be nice to be able to keep an ISP from spying on its customers as part of its "private network". However, I don't see how to differentiate an ISP's network from a enterprise network.

If it is not technically possible to use the protocol without both ends being aware that it is in use, then user interfaces can reflect its use. One result would be that enterprise users would be continually warned that their messages aren't private.

Any technical fixes we build into the protocol that prevent these actions are a positive improvement.

Cheers - Bill

---------------------------------------------------------------------------
Bill Frantz | If you want total security, go to prison. There you're 408-356-8506 | fed, clothed, given medical care and so on. The only
www.pwpconsult.com | thing lacking is freedom. - Dwight D. Eisenhower

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to