➢ Our proposals are for spanned/tapped, passive traffic.    You seem to be 
talking about modifying the 
➢ actual  live data stream.  

Yes I am.

➢     And MitM is also outside of what we want to do but would seem to be more 
feasible in that scernario.  

I think that is a grudging admission that it does, but please be explicit.  
Does your proposal enable an attacker (such as a gateway on an airplane or any 
other middlebox between the endpoints) to modify the stream?  Ideally your 
answer – or, better yet, from one of the I-D authors – is yes, no, or I don’t 
know.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to