* The requirements for visibility exist in an array of regulated environments worldwide. It is one of the presentation areas in the Hot Middlebox Workshop. http://www.etsi.org/etsi-security-week-2018/middlebox-security?tab=1<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.etsi.org_etsi-2Dsecurity-2Dweek-2D2018_middlebox-2Dsecurity-3Ftab-3D1&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=Yz_0b8nsA9CDyOxIGLCsjdmfsbcx2aanAH-oeuvMpkk&s=NW0inE5_1gzb4brUZGMm47dZyrYtkYXtAXf7Ii6S8kk&e=>
Do you know if they require packet traces to be decoded, or if one of the nodes can just log the traffic? Do they require this to be true for traffic over the public Internet or just within an enterprise?
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls