Our proposals are for spanned/tapped, passive traffic. You seem to be talking about modifying the actual live data stream. And MitM is also outside of what we want to do but would seem to be more feasible in that scernario.
-----Original Message----- From: Salz, Rich [mailto:rs...@akamai.com] Sent: Tuesday, October 24, 2017 9:30 AM To: Ackermann, Michael <mackerm...@bcbsm.com> Cc: tls@ietf.org Subject: Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00 ➢ The objective is to be passively observe, out of band and not to be a MitM or modify/inject text. Just as we all do today. That might be the objective, but isn’t Ben correct? If a third-party has the session keys, what prevents them from doing that? Good behavior? Or is there some technical means (unclear to me) to actually prevent it? As I used to read in the comics of my youth, https://www.urbandictionary.com/define.php?term=good%20lord%21%20choke I am glad that this conversation thread kept going, like a zombie it keeps rising. We know have enough knowledge to definitively put a stake through its heart, forever. The information contained in this communication is highly confidential and is intended solely for the use of the individual(s) to whom this communication is directed. If you are not the intended recipient, you are hereby notified that any viewing, copying, disclosure or distribution of this information is prohibited. Please notify the sender, by electronic mail or telephone, of any unintended receipt and delete the original message without making any copies. Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are nonprofit corporations and independent licensees of the Blue Cross and Blue Shield Association. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls