Integrity protection text:

     This document assumes that data integrity protection is always
one of
     the goals of a deployment.  In cases when integrity is not required,
     it does not make sense to employ TLS in the first place.  There are
     attacks against confidentiality-only protection that utilize the
lack
     of integrity to also break confidentiality (see e.g.
[DegabrieleP07]
     in the context of IPsec).

It is not clear whether this is talking about integrity via
authenticated key exchange?  Or integrity protection of the data
stream via HMAC, AEAD, ...?  If the former, then there is once again
a conflict with keeping opportunistic TLS in scope.

I think we're talking about integrity protection of the data stream, but
I will check that with my co-authors.


Yes, this is why we talk about *data* integrity protection on the first line.

Thanks,
        Yaron

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to