diff --git a/draft-ietf-tls-keylogfile.md b/draft-ietf-tls-keylogfile.md index b81e07b..7d92655 100644 --- a/draft-ietf-tls-keylogfile.md +++ b/draft-ietf-tls-keylogfile.md @@ -249,10 +249,9 @@ access to these capabilities. Forward secrecy guarantees provided in TLS 1.3 (see {{Section 1.2 and Appendix E.1 of ?RFC8446}}) and some modes of TLS 1.2 (such as those in {{Sections 2.2 -and 2.4 of ?RFC4492}}) do not hold if keys are saved. Access to logged keys -affects the authenticity, confidentiality, and integrity of any data that is -exchanged for longer period than if an authentication key is compromised. - +and 2.4 of ?RFC4492}}) do not hold if key material is recorded. Access to key +material allows an attacker to decrypt data exchanged in any logged TLS +connections. Logging the TLS 1.2 "master" secret provides the recipient of that secret far greater access to an active connection than TLS 1.3 secrets. In addition to reading and altering protected messages, the TLS 1.2 "master" secret confers the