diff --git a/fs-break/draft-ietf-tls-keylogfile.html b/fs-break/draft-ietf-tls-keylogfile.html
index 840ab08..c06423e 100644
--- a/fs-break/draft-ietf-tls-keylogfile.html
+++ b/fs-break/draft-ietf-tls-keylogfile.html
@@ -1034,7 +1034,7 @@
@@ -1105,7 +1105,7 @@
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."¶
- This Internet-Draft will expire on 16 September 2024.¶
+ This Internet-Draft will expire on 17 September 2024.
¶
@@ -1413,14 +1413,14 @@
access to these capabilities.¶
Forward secrecy guarantees provided in TLS 1.3 (see Section 1.2 and Appendix E.1 of [RFC8446]) and some modes of TLS 1.2 (such as those in Sections 2.2 and 2.4 of [RFC4492]) do not hold if key material is recorded. Access to key
material allows an attacker to decrypt data exchanged in any logged TLS
-connections.
-Logging the TLS 1.2 "master" secret provides the recipient of that secret far
+connections.¶
+
Logging the TLS 1.2 "master" secret provides the recipient of that secret far
greater access to an active connection than TLS 1.3 secrets. In addition to
reading and altering protected messages, the TLS 1.2 "master" secret confers the
ability to resume the connection and impersonate either endpoint, insert records
that result in renegotiation, and forge Finished messages. Implementations can
avoid the risks associated with these capabilities by not logging this secret
-value.¶
+value.
¶
diff --git a/fs-break/draft-ietf-tls-keylogfile.txt b/fs-break/draft-ietf-tls-keylogfile.txt
index d329846..abf7d00 100644
--- a/fs-break/draft-ietf-tls-keylogfile.txt
+++ b/fs-break/draft-ietf-tls-keylogfile.txt
@@ -4,8 +4,8 @@
Transport Layer Security M. Thomson
Internet-Draft Mozilla
-Intended status: Informational 15 March 2024
-Expires: 16 September 2024
+Intended status: Informational 16 March 2024
+Expires: 17 September 2024
The SSLKEYLOGFILE Format for TLS
@@ -50,7 +50,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 16 September 2024.
+ This Internet-Draft will expire on 17 September 2024.
Copyright Notice
@@ -297,14 +297,16 @@ Table of Contents
Appendix E.1 of [RFC8446]) and some modes of TLS 1.2 (such as those
in Sections 2.2 and 2.4 of [RFC4492]) do not hold if key material is
recorded. Access to key material allows an attacker to decrypt data
- exchanged in any logged TLS connections. Logging the TLS 1.2
- "master" secret provides the recipient of that secret far greater
- access to an active connection than TLS 1.3 secrets. In addition to
- reading and altering protected messages, the TLS 1.2 "master" secret
- confers the ability to resume the connection and impersonate either
- endpoint, insert records that result in renegotiation, and forge
- Finished messages. Implementations can avoid the risks associated
- with these capabilities by not logging this secret value.
+ exchanged in any logged TLS connections.
+
+ Logging the TLS 1.2 "master" secret provides the recipient of that
+ secret far greater access to an active connection than TLS 1.3
+ secrets. In addition to reading and altering protected messages, the
+ TLS 1.2 "master" secret confers the ability to resume the connection
+ and impersonate either endpoint, insert records that result in
+ renegotiation, and forge Finished messages. Implementations can
+ avoid the risks associated with these capabilities by not logging
+ this secret value.
4. IANA Considerations