I've already responded to this! Why are you wasting everyone's time by asking the same questions over and over, even though I've already clearly answered them?

An airplane/wifi provider might say "download our free browser," but it won't rely on draft-rhrd-tls-tls13-visibility to snoop on its customers. If the airplane/wifi provider controls the software on its customers' computers, it doesn't need the cooperation of the servers that the customers are connecting to in order to snoop, so it wouldn't go through the effort of trying to get that cooperation. And, if the airplane/wifi provider has the cooperation of the servers that the customers are connecting to it doesn't need to convince its customers to download any software or in any other way get the customers to cooperate in allowing the snooping, so it won't bother.. If you believe otherwise, then you are the one who is being very naïve.

I can't guarantee that enterprise visibility will stop at the enterprise firewall. My argument is simply that use of the protocol in this draft will stop at the enterprise firewall since outside the firewall, when communicating with clients outside of the enterprise's control, the enterprises that want to enable "visibility" into such traffic will use other means that don't require the the cooperation or knowledge of the clients, since those other means would be easier and more effective. You have done nothing to suggest otherwise.

On 10/25/2017 10:56 AM, Salz, Rich wrote:
    This question is based on your that belief that this protocol will "escape" 
onto the public Internet
Yes.  Are you saying that you don’t believe that the enterprise visibility will 
stop at their firewall?  That they will allow ‘stock’ TLS 1.3 to work 
connecting to their sites?  That the airplane/wifi provider won’t say ‘download 
our free browser’?

I think you’re being very naïve to think otherwise.



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to