On Tue, Feb 25, 2025, at 06:56, Aaron Zauner wrote:
> To be clear; I agree with that in principle but have the feeling that 
> the discussion around an applicable threat model misses the issue of 
> what should be in IETF and what should be in development docs, 
> debugging tools etc entirely. I'm not currently working on maintaining 
> a crypto lib as many of you are but you can't honestly tell me it's not 
> possible to work on your end without IETF guidance on debug specifics 
> that allow encrypted traffic detail export -- which you already have in 
> place for debug and dev anyway.

This also misses the point.  The existence of this format (it will exist 
whether the IETF publishes a document or not) has enabled interoperation 
between a number of tools.  The point of moving this work to the IETF was to 
transfer governance from what was ad hoc to something recognized and respected 
by the community of people who build the interoperating tools.

Some people view interoperable standards as somehow changing the demand and 
availability of the thing they document.  Maybe that's true in some markets, 
but my experience is that the demand is what causes the creation of standards, 
not the other way around.  Also, if there were not already interoperation and 
you were concerned that interoperation would cause problems, this might be 
problematic, but this is a case where that interoperation already exists.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to