On Tue, Aug 17, 2010 at 2:08 AM, Seth David Schoen wrote:
[snip]
> I'm tempted to reply pointing out that _all_ uses of TLS represent
> at least potential support for a threat model in which a network
> operator is the adversary whom users are trying to defend against.
> So there's not much concep
Thus spake Seth David Schoen (sch...@eff.org):
> Much of the debate centers around the idea that NPN will make it
> harder for network operators to know what protocols users are using
> over TLS and hence to block particular protocols while permitting
> others. One of the proponents (Adam Langley
Over on the TLS WG mailing list at IETF there is some debate over
the NPN (Next Protocol Negotation) TLS extension, which originated
outside of TLS WG but is now starting to be brought up there for
standardization. The thread starts at
http://www.ietf.org/mail-archive/web/tls/current/msg06862.htm
3 matches
Mail list logo