> Or are you simply trying to delay the inevitable?
    
    I'm open to any solution which meets the stated requirements & is 
deployable & usable on real-world
    production networks, without necessitating a total redesign of said 
networks & the complete social
    reorganization of the entities in question. 
    
    ;>

It’s not the networks that need to be “totally redesigned”, but the mechanism 
to do surveillance. And only for some kinds of traffic (that uses TLS 1.3).
And we are not talking about “complete” “social reorganization” of the entities 
(if you mean endpoints) – most of them already carry all that’s necessary (and 
more) to perform surveillance from inside the endpoint.
    
    There's some very constructive discussion taking place now about the 
relative merits of various approaches, & I'm following it quite keenly. 

So am I. ;>
    
    -----------------------------------
    Roland Dobbins <rdobb...@arbor.net>
    

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to