- From: Poul-Henning Kamp <phk@phk.freebsd.dk>
- Date: Mon, 05 Mar 2012 10:43:14 +0000
- To: Willy Tarreau <w@1wt.eu>
- cc: Anne van Kesteren <annevk@opera.com>, Julian Reschke <julian.reschke@gmx.de>, URI <uri@w3.org>, HTTP Working Group <ietf-http-wg@w3.org>, Ian Hickson <ian@hixie.ch>
In message <20120305104004.GC30594@1wt.eu>, Willy Tarreau writes: >Being able to encrypt only the payload would be extremely useful in >server-to-server communications in datacenters. How usefull is it, when packet sniffing gets you both the key and the encrypted data ? I could understand it if the userinfo pointed to a PSK, but sending the actual AES key as part of the request defeats any attempt at privacy I can see ? -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Received on Monday, 5 March 2012 10:43:43 UTC