Dan York skrev 2014-10-22 23:09:
Question for the group  - while UTA is chartered to document best practices for 
TLS clients and servers, and to create a document for application protocol 
developers...  has anyone developed a document for network operators about 
recommendations for how they can best support all these TLS-encrypted 
applications?

It occurs to me that if we want TLS to be used by applications everywhere, it would also be helpful 
to provide guidance to network operators about how they can help with this overall "security 
upgrade" by not blocking TLS-encrypted streams from applications. Has anyone come up with any 
suggestions for ISPs/network operators (including enterprise networks that might have a firewall at 
the edge)?   Or is there nothing more really to say than "don't block TLS-encrypted apps"?

Just curious,
Dan

P.S. And please feel free to tell me this is better sent to OPSEC or OPSAWG - 
or better yet to point me to docs there that I haven't found yet...

I get a lot of worried questions much like: "Then we can't use wireshark" when I talk about crypto.

That needs to be adressed too.

/O

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to