Hello,

I have just become aware of this draft and I believe there might be a good 
cautionary addition I would like to propose:

Specifically, I am worried that with further encouragement to standardize this 
format, it will become a convenient way to surveil unsuspecting end users. All 
this requires is "some" access to the system, for many implementations this 
includes setting an environment variable. What an attacker gains is then 
something more reliable, machine-readable (and in many cases useful) than a 
simple keylogger.

The problem here (in my opinion) is the word "unsuspecting". I would like to 
see an addition to the draft along the following lines:

> A TLS application interacting with an end-user (e.g. a browser) MUST clearly 
> communicate any requests to log TLS secrets to the user and MUST NOT indicate 
> a secure connection.

Otherwise, this draft looks fine to me.
Thanks for your efforts,

Thomas

-- 

```
M.Sc. Thomas Bellebaum
Applied Privacy Technologies
Fraunhofer Institute for Applied and Integrated Security AISEC

Lichtenbergstraße 11, 85748 Garching near Munich (Germany)
Tel. +49 89 32299 86 1039
thomas.belleb...@aisec.fraunhofer.de
https://www.aisec.fraunhofer.de

```

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to