> On Jul 15, 2017, at 14:48, Ted Lemon <mel...@fugue.com> wrote:
> 
> In the event that it is not feasible for an operator to obtain the plaintext 
> of a message without the key, isn't that because they don't control either 
> endpoint?

First of all, what goes on the wire is often contextually different  (and 
probatively so) from what's recorded in abstract log files. 

Secondly, administrative divisions within a single organization often impede 
cooperation between those tasked with securing & troubleshooting communications 
and those who 'own' the assets in question. 

Thirdly, for both security & troubleshooting applications, the hard requirement 
is for real-time visibility & possible intercession, not ex post facto 
analysis. 

-----------------------------------
Roland Dobbins <rdobb...@arbor.net>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to