➢ The objective is to be passively observe, out of band and not to be a MitM or modify/inject text. Just as we all do today. That might be the objective, but isn’t Ben correct? If a third-party has the session keys, what prevents them from doing that? Good behavior? Or is there some technical means (unclear to me) to actually prevent it?
As I used to read in the comics of my youth, https://www.urbandictionary.com/define.php?term=good%20lord%21%20choke I am glad that this conversation thread kept going, like a zombie it keeps rising. We know have enough knowledge to definitively put a stake through its heart, forever. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls