Martin:

>>> At the point that I have sufficient control over a host that I can run
>>> my software, then I would pin certificates and the best you could do
>>> is block me.  None of the advice about configuration of trust anchors
>>> (pinning, overrides, etc...) helps at that point.
>> 
>> Correct.  Which is why it's critical in the intranet context, within a
>> single span of administrative control, to have visibility into the actual
>> cryptostream.
> 
> Roland, I think that you missed my point here.  My point was that you
> don't get that visibility when it is malware at both ends of the
> connection (assuming a modest amount of competency from the authors).

I think that the IDS is trying to detect the an infected server trying to 
migrate to another server.  Malware often includes a series of exploits that 
are tried in sequence to infect a neighbor, and this activity provides a 
detectable signature.

Russ

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to