On Mon, Jan 2, 2017 at 11:43 AM, Yoav Nir <ynir.i...@gmail.com> wrote:
> I’m assuming that the server generates private keys and saves them to a file
> along with the time period that they were used, and another machine in a
> different part of the network records traffic. It’s not so much that the
> clocks need to be accurate, as that they need to be synchronized, and there
> will still be some misalignment because of (variable) latency.
>
> I guess we are making guesses about systems that haven’t been written yet.

Addressing a few messages in one:

I didn't intend that this MUST NOT just be a "MUST NOT (but we know
you will)". I agree they're pretty useless. Rather I want this to be
checked in some clients and in tools like SSLLabs. I have some faith
that such measures will work to push an ecosystem towards correctness.

I don't expect that those who want to intercept TLS connections will
see a MUST NOT and go do something else. Rather I think they should
understand that TLS isn't supposed to be intercepted and, if they want
to do that, then they're going to be breaking the spec in places. I
think they're going to do that no matter what we do so I want to
ensure that these "interceptable" implementations don't inadvertently
proliferate. (Because if everything Just Works when you accidentally
copy such a config to your frontend server, then it'll happen.)


Cheers

AGL

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to