On Jul 19, 2017 11:38 AM, "Roland Dobbins" <rdobb...@arbor.net> wrote:

On 19 Jul 2017, at 20:29, Watson Ladd wrote:

Now it turns out that the requirements on solutions came from
> organizational issues you never told us about.
>

The organizational issues have been described previously, both on the list
and in the meetings; and the technical issues are quite separate from the
organizational ones.  The one isn't the cause of the other.

In many cases, the organizational issues do not exist, yet the technical
ones remain.


What are the technical requirements?


There is a serious technical issue here; the only reason the organizational
issues were even mentioned was to provide context.


I still don't see a response to how you determine unauthorized access
> happened without being the authority on what access is authorized.
>

It's possible to have the relevant access policy information to hand
without being the authority oneself.


Why can't the enforcing mechanism log its enforcement?



Apparently exporting the PMS from clients and servers  isn't possible: I
> find that hard to believe.
>

It isn't practical from a performance nor a network architecture
perspective.


We're talking one extra encryption+transmission. How is this not possible?



Let's standardize an extension that exports an encrypted EMS and be done
> with this debate.
>

That does not meet the technical requirements.


Why not? It enables interception if both ends opt in with the encrypted
packets. (I see I made a typo: I meant PMS) what does the green draft do
this does not?


There's some quite useful and constructive discussion of possible
approaches taking place - I'm observing it with interest.

-----------------------------------
Roland Dobbins <rdobb...@arbor.net>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to