I have not heard any assertions that looking at unencrypted tls
traffic is not valuable. I agree that there are cases that it is. What
I and others have disagreed with is that the examples provided on the
list and in the draft of where it is necessary are either not
applicable, or simply 'easier' rather than necessary.
In the email below, I was trying to find out which case malware would
fall into. do you have an example of where malware would be on your
intranet using this draft (the only way that this draft would help you
with malware analyzing), if you do not, let's remove malware analysis
from this list of arguments for this draft.


On Mon, Jul 17, 2017 at 8:54 AM, Dobbins, Roland <rdobb...@arbor.net> wrote:
>
>
> On Jul 17, 2017, at 15:40, Carl Mehner <c...@cem.me> wrote:
>
> Why would malware use this draft?
>
>
> Nobody said anything about malware using this draft.
>
> What I'm saying is that the ability to look inside the TLS tunnel & infer
> the presence of an additional, unexpected cryptostream - even without the
> ability to decrypt it - is quite valuable.
>
> -----------------------------------
> Roland Dobbins <rdobb...@arbor.net>
>
> -----------------------------------
> Roland Dobbins <rdobb...@arbor.net>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to