>Using TLS in Applications is useful work but not quite what I was suggesting.
These are complementary approaches, indeed.

>...I am pretty sure that some of our application protocols cannot be deployed 
>securely and standards compliant.
Please, submit these cases to UTA if related to usage of TLS. This will be very 
helpful and open to the broad community review.

>There is also a question of audience participation. The audience for these 
>specs would be security practitioners, not protocol designers. 
One of the important UTA's (and of IETF at large) goals is broadening the 
"security practitioners" circle to include "application protocols" designers 
and developers. I believe that this cross-pollination of ideas and needs will 
make a practical difference.

Orit.
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to