On Tue, May 20, 2025, at 15:53, mohamed.boucad...@orange.com wrote: > [Med] That part in security cons is really great. I was looking for a > mention early in the document,
I see. Ultimately, we're in a bit of a weird position here. On the one hand, we say that this is only good for test systems, which would mean that authorization for accessing the files isn't that important. On the other hand, we know that authorization for both enabling the capability and then accessing the files could be the only thing preventing abuses. Overall, I prefer the current arrangement, which focuses on the test usage up front. Otherwise, we potentially hollow out the applicability statement. It's a delicate balance. _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org