I think that your first and third points are actually non-sequiturs: the
unencrypted stream is available to the entities controlling either
endpoint, not just the log.   There is no *technical *reason that in-flight
capture is required to address those two points.

Regarding your second point, this seems to be the real key that is
motivating you to make the first and third points.   If I may paraphrase,
the problem you are attempting to address is that in some situations two
sub-organizations both of which are in principle responsible to a larger
organization nonetheless are unable to cooperate due essentially to a
failure by one sub-organization to take seriously the responsibilities of
the other sub-organization, and the failure of the organization to which
they are both subordinate to successfully encourage cooperation on the part
of the intransigent sub-organization.   Did I paraphrase that correctly?

On Sat, Jul 15, 2017 at 9:54 AM, Dobbins, Roland <rdobb...@arbor.net> wrote:

>
>
> > On Jul 15, 2017, at 14:48, Ted Lemon <mel...@fugue.com> wrote:
> >
> > In the event that it is not feasible for an operator to obtain the
> plaintext of a message without the key, isn't that because they don't
> control either endpoint?
>
> First of all, what goes on the wire is often contextually different  (and
> probatively so) from what's recorded in abstract log files.
>
> Secondly, administrative divisions within a single organization often
> impede cooperation between those tasked with securing & troubleshooting
> communications and those who 'own' the assets in question.
>
> Thirdly, for both security & troubleshooting applications, the hard
> requirement is for real-time visibility & possible intercession, not ex
> post facto analysis.
>
> -----------------------------------
> Roland Dobbins <rdobb...@arbor.net>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to