On Tue, May 20, 2025, at 15:53, mohamed.boucad...@orange.com wrote:
> [Med] That part in security cons is really great. I was looking for a 
> mention early in the document, 

I see.  Ultimately, we're in a bit of a weird position here.  On the one hand, 
we say that this is only good for test systems, which would mean that 
authorization for accessing the files isn't that important.  On the other hand, 
we know that authorization for both enabling the capability and then accessing 
the files could be the only thing preventing abuses.  

Overall, I prefer the current arrangement, which focuses on the test usage up 
front.  Otherwise, we potentially hollow out the applicability statement.  It's 
a delicate balance.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to