➢     The objective is to be passively observe, out of band and not to be a 
MitM or modify/inject text.    Just as we all do today.  
    
That might be the objective, but isn’t Ben correct?  If a third-party has the 
session keys, what prevents them from doing that?  Good behavior?  Or is there 
some technical means (unclear to me) to actually prevent it?

As I used to read in the comics of my youth, 
https://www.urbandictionary.com/define.php?term=good%20lord%21%20choke  I am 
glad that this conversation thread kept going, like a zombie it keeps rising.  
We know have enough knowledge to definitively put a stake through its heart, 
forever.



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to