- From: Mark Nottingham <mnot@mnot.net>
- Date: Mon, 6 Oct 2014 10:45:25 +1100
- To: Greg Wilkins <gregw@intalio.com>
- Cc: Martin Thomson <martin.thomson@gmail.com>, HTTP Working Group <ietf-http-wg@w3.org>
On 6 Oct 2014, at 10:37 am, Greg Wilkins <gregw@intalio.com> wrote: > The issue is that if we bake in restrictions for the main deployment mode of the protocol, we are prohibiting niche deployments modes that may use null, weak or unusual ciphers. That’s by design. Nothing stops someone from explicitly configuring a pair of endpoints to violate the protocol for testing purposes — we just need to be clear what “normal” operation is. Cheers, -- Mark Nottingham http://www.mnot.net/
Received on Sunday, 5 October 2014 23:45:55 UTC