I think there's no way the connection can be established if the third party in 
control of the network does not allow that. 

My only goal here is to leave fewer possibilities to set the eavesdropping 
silently.

Regards,
Uri

Sent from my iPhone

> On Jul 23, 2017, at 10:33, Ted Lemon <mel...@fugue.com> wrote:
> 
> I did a little bit of rubber-duck debugging on this proposal with Andrea on 
> the way back from Boston this morning.   It's actually better for the server 
> to secretly use a static key than to negotiate.   Stephen has already 
> explained why: if this is a negotiation, then it's possible for a third party 
> to simply block any negotiation that doesn't allow it.   We have no control 
> over evil endpoints, and it's silly to pretend otherwise.   Pretending 
> otherwise makes us less secure, not more secure.
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to