diff --git a/fs-break/draft-ietf-tls-keylogfile.html b/fs-break/draft-ietf-tls-keylogfile.html index 840ab08..c06423e 100644 --- a/fs-break/draft-ietf-tls-keylogfile.html +++ b/fs-break/draft-ietf-tls-keylogfile.html @@ -1034,7 +1034,7 @@ Thomson -Expires 16 September 2024 +Expires 17 September 2024 [Page] @@ -1047,12 +1047,12 @@
draft-ietf-tls-keylogfile-latest
Published:
- +
Intended Status:
Informational
Expires:
-
+
Author:
@@ -1105,7 +1105,7 @@

time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

- This Internet-Draft will expire on 16 September 2024.

+ This Internet-Draft will expire on 17 September 2024.

diff --git a/fs-break/draft-ietf-tls-keylogfile.txt b/fs-break/draft-ietf-tls-keylogfile.txt index d329846..abf7d00 100644 --- a/fs-break/draft-ietf-tls-keylogfile.txt +++ b/fs-break/draft-ietf-tls-keylogfile.txt @@ -4,8 +4,8 @@ Transport Layer Security M. Thomson Internet-Draft Mozilla -Intended status: Informational 15 March 2024 -Expires: 16 September 2024 +Intended status: Informational 16 March 2024 +Expires: 17 September 2024 The SSLKEYLOGFILE Format for TLS @@ -50,7 +50,7 @@ Status of This Memo time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on 16 September 2024. + This Internet-Draft will expire on 17 September 2024. Copyright Notice @@ -297,14 +297,16 @@ Table of Contents Appendix E.1 of [RFC8446]) and some modes of TLS 1.2 (such as those in Sections 2.2 and 2.4 of [RFC4492]) do not hold if key material is recorded. Access to key material allows an attacker to decrypt data - exchanged in any logged TLS connections. Logging the TLS 1.2 - "master" secret provides the recipient of that secret far greater - access to an active connection than TLS 1.3 secrets. In addition to - reading and altering protected messages, the TLS 1.2 "master" secret - confers the ability to resume the connection and impersonate either - endpoint, insert records that result in renegotiation, and forge - Finished messages. Implementations can avoid the risks associated - with these capabilities by not logging this secret value. + exchanged in any logged TLS connections. + + Logging the TLS 1.2 "master" secret provides the recipient of that + secret far greater access to an active connection than TLS 1.3 + secrets. In addition to reading and altering protected messages, the + TLS 1.2 "master" secret confers the ability to resume the connection + and impersonate either endpoint, insert records that result in + renegotiation, and forge Finished messages. Implementations can + avoid the risks associated with these capabilities by not logging + this secret value. 4. IANA Considerations