➢ Our proposals are for spanned/tapped, passive traffic. You seem to be talking about modifying the ➢ actual live data stream.
Yes I am. ➢ And MitM is also outside of what we want to do but would seem to be more feasible in that scernario. I think that is a grudging admission that it does, but please be explicit. Does your proposal enable an attacker (such as a gateway on an airplane or any other middlebox between the endpoints) to modify the stream? Ideally your answer – or, better yet, from one of the I-D authors – is yes, no, or I don’t know. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls