On 21/08/18 14:36, Andreas Walz wrote: > > I strongly believe it is *not* a good idea to hold back all the valuable > experience condensed in TLS and entail the design of customized security > protocols for such systems. TLS is state-of-the-art and its benefits > should be accessible to as many systems as possible.
I agree. Quoting the meat of the abstract of RFC8446: TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. Using TLS in non-Internet contexts is just fine. Possibly weakening the "prevent eavesdropping" part is the issue here. Confidentiality is required for lots of reasons, e.g. bearer token security, or maybe even firmware updates, as pointed out earlier in this thread. Cheers, S.
0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls