>Using TLS in Applications is useful work but not quite what I was suggesting. These are complementary approaches, indeed.
>...I am pretty sure that some of our application protocols cannot be deployed >securely and standards compliant. Please, submit these cases to UTA if related to usage of TLS. This will be very helpful and open to the broad community review. >There is also a question of audience participation. The audience for these >specs would be security practitioners, not protocol designers. One of the important UTA's (and of IETF at large) goals is broadening the "security practitioners" circle to include "application protocols" designers and developers. I believe that this cross-pollination of ideas and needs will make a practical difference. Orit. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
