Exactly. I for one am against such "enhancements" and agree that treating them as errors is the right way.
Regards, Uri Sent from my iPhone > On Dec 1, 2018, at 20:44, Christian Huitema <huit...@huitema.net> wrote: > > >> On 12/1/2018 11:14 AM, Tony Rutkowski wrote: >> >> The eTLS use case is an enterprise network or data center that is >> owned or dedicated and under the control of a company (e.g., a >> financial institution) or government agency that is subject to >> compliance obligations that require auditing and traffic monitoring >> capabilities for their systems and users. This relatively bounded use >> case should be kept in mind here. The associated tutorial is >> helpful. >> https://www.etsi.org/news-events/events/1338-2018-10-webinar-middlebox-security-protocol-explained >> > > Which reinforces the idea that these "enhancements" have no legitimate > reason to be found "in the wild", and hence should be treated as errors > when detected. > > -- Christian Huitema > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls