- From: Chad Goss <chgoss@gmail.com>
- Date: Fri, 13 Jul 2012 12:01:16 -0400
- To: ietf-http-wg@w3.org
Received on Friday, 13 July 2012 16:01:44 UTC
Hi, I have read the draft, the primary question I had was what is the mechanism to transfer the decryption key material from user-agent to configured-proxy in a secure, authenticated and trusted manner immediately after tunnel establishment, and how are you going to do that prior to any traffic traversing the tunnel? thanks -chad
Received on Friday, 13 July 2012 16:01:44 UTC