> Or are you simply trying to delay the inevitable? I'm open to any solution which meets the stated requirements & is deployable & usable on real-world production networks, without necessitating a total redesign of said networks & the complete social reorganization of the entities in question. ;>
It’s not the networks that need to be “totally redesigned”, but the mechanism to do surveillance. And only for some kinds of traffic (that uses TLS 1.3). And we are not talking about “complete” “social reorganization” of the entities (if you mean endpoints) – most of them already carry all that’s necessary (and more) to perform surveillance from inside the endpoint. There's some very constructive discussion taking place now about the relative merits of various approaches, & I'm following it quite keenly. So am I. ;> ----------------------------------- Roland Dobbins <rdobb...@arbor.net>
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls