> On Jul 15, 2017, at 14:48, Ted Lemon <mel...@fugue.com> wrote: > > In the event that it is not feasible for an operator to obtain the plaintext > of a message without the key, isn't that because they don't control either > endpoint?
First of all, what goes on the wire is often contextually different (and probatively so) from what's recorded in abstract log files. Secondly, administrative divisions within a single organization often impede cooperation between those tasked with securing & troubleshooting communications and those who 'own' the assets in question. Thirdly, for both security & troubleshooting applications, the hard requirement is for real-time visibility & possible intercession, not ex post facto analysis. ----------------------------------- Roland Dobbins <rdobb...@arbor.net> _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls