Our proposals are for spanned/tapped, passive traffic.    You seem to be 
talking about modifying the actual  live data stream.  
And MitM is also outside of what we want to do but would seem to be more 
feasible in that scernario.  

-----Original Message-----
From: Salz, Rich [mailto:rs...@akamai.com] 
Sent: Tuesday, October 24, 2017 9:30 AM
To: Ackermann, Michael <mackerm...@bcbsm.com>
Cc: tls@ietf.org
Subject: Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

➢     The objective is to be passively observe, out of band and not to be a 
MitM or modify/inject text.    Just as we all do today.  
    
That might be the objective, but isn’t Ben correct?  If a third-party has the 
session keys, what prevents them from doing that?  Good behavior?  Or is there 
some technical means (unclear to me) to actually prevent it?

As I used to read in the comics of my youth, 
https://www.urbandictionary.com/define.php?term=good%20lord%21%20choke  I am 
glad that this conversation thread kept going, like a zombie it keeps rising.  
We know have enough knowledge to definitively put a stake through its heart, 
forever.





The information contained in this communication is highly confidential and is 
intended solely for the use of the individual(s) to whom this communication is 
directed. If you are not the intended recipient, you are hereby notified that 
any viewing, copying, disclosure or distribution of this information is 
prohibited. Please notify the sender, by electronic mail or telephone, of any 
unintended receipt and delete the original message without making any copies.
 
 Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are 
nonprofit corporations and independent licensees of the Blue Cross and Blue 
Shield Association.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to