We are ramping ECH up to 10% of Stable Channel. We will send an Intent-to-Ship if the rollout continues successfully.
On Fri, Jun 9, 2023 at 10:38 AM Achiel van der Mandele < ach...@cloudflare.com> wrote: > That's great to hear! Looking forward to ECH traffic ramping up (from the > looks of it 115 is slated to go out in July?) > > Thanks, > -- > Achiel van der Mandele > Product Manager > > > On Fri, Jun 9, 2023 at 11:13 AM 'David Adrian' via blink-dev < > blink-dev@chromium.org> wrote: > >> We've been running ECH at 50% Beta for TCP since I last posted (Nov 7, >> 2022). We recently landed support for ECH+QUIC, which is also running on >> Beta. We never made it to 1% Stable, so I'd like to continue to experiment >> / actually start a stable experiment, probably from 115-119. >> >> The main server-side deployment we know of prefers QUIC, so the QUIC >> implementation was blocking real data collection. >> >> On Monday, November 7, 2022 at 12:29:07 PM UTC-7 David Adrian wrote: >> >>> An update: >>> >>> - We are deploying to 50% Beta as I write >>> - We have seen very little usage so far, however the usage we do see >>> is basically entirely successful. >>> >>> The main issue at this point is Chrome does not yet support ECH with >>> QUIC connections, and the main deployment we know of prefers QUIC to TCP. >>> We plan to add QUIC support before experimenting further, and will update >>> this thread accordingly. >>> >>> Similarly, we will need to extend the length of this experiment at least >>> through M111 in January, 2023. >>> >>> On Wed, Aug 24, 2022 at 8:32 AM Mike West <mk...@chromium.org> wrote: >>> >>>> LGTM to experiment from M105 to M109 (inclusive). It'd be excellent to >>>> come back to the group with initial results in the (likely?) case you need >>>> to extend and revise. >>>> >>>> Good luck! >>>> >>>> -mike >>>> >>>> >>>> >>>> On Tue, Aug 23, 2022 at 8:03 PM David Benjamin <davi...@chromium.org> >>>> wrote: >>>> >>>>> (Sorry for the late reply. Was out sick for a bit.) >>>>> >>>>> On Thu, Aug 11, 2022 at 4:06 PM Mike West <mk...@google.com> wrote: >>>>> >>>>>> I'm excited to see this! One question inline about timelines: >>>>>> >>>>>> On Thursday, August 11, 2022 at 9:55:48 PM UTC+2 David Benjamin wrote: >>>>>> >>>>>>> Contact emailsdavi...@chromium.org, dad...@google.com >>>>>>> >>>>>>> ExplainerNone >>>>>>> >>>>>>> Specification >>>>>>> https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni >>>>>>> >>>>>>> Summary >>>>>>> >>>>>>> The TLS Encrypted ClientHello (ECH) extension enables clients to >>>>>>> encrypt ClientHello messages, which are normally sent in cleartext, >>>>>>> under a >>>>>>> server’s public key. This allows websites to opt-in to avoid leaking >>>>>>> sensitive fields, like the server name, to the network by hosting a >>>>>>> special >>>>>>> HTTPS RR DNS record. (Earlier iterations of this extension were called >>>>>>> Encrypted Server Name Indication, or ESNI.) >>>>>>> >>>>>>> >>>>>>> Blink componentInternals>Network>SSL >>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL> >>>>>>> >>>>>>> Search tagsech <https://chromestatus.com/features#tags:ech>, esni >>>>>>> <https://chromestatus.com/features#tags:esni>, tls >>>>>>> <https://chromestatus.com/features#tags:tls>, ssl >>>>>>> <https://chromestatus.com/features#tags:ssl> >>>>>>> >>>>>>> TAG reviewNot applicable; this is a protocol under IETF >>>>>>> >>>>>>> TAG review statusNot applicable >>>>>>> >>>>>>> Risks >>>>>>> >>>>>>> >>>>>>> Interoperability and Compatibility >>>>>>> >>>>>>> As a networking protocol, interoperability risks look different from >>>>>>> a web platform API: This is a draft of a developing protocol, so the >>>>>>> final >>>>>>> standard will differ from what we ship now. We manage this as in other >>>>>>> protocol work: the draft uses different codepoints in the DNS record and >>>>>>> ClientHello, set up to not conflict with the final standard. There is >>>>>>> also >>>>>>> a risk of breaking buggy servers or network middleware. ECH is >>>>>>> DNS-gated, >>>>>>> so non-ECH servers won't be exposed to ECH itself. We do implement ECH's >>>>>>> GREASE mechanism (section 6.2 of the draft), but this should appear as >>>>>>> any >>>>>>> normal unrecognized extension to non-ECH servers. Servers and network >>>>>>> elements that are compliant with RFC 8446, section 9.3, should not be >>>>>>> impacted. We will be monitoring for these issues as part of the >>>>>>> experiment, >>>>>>> comparing error rates and handshake times both for HTTPS servers as a >>>>>>> whole, and the subset of those that advertise ECH in DNS. >>>>>>> >>>>>>> >>>>>>> *Gecko*: In development ( >>>>>>> https://blog.mozilla.org/security/2021/01/07/encrypted-client-hello-the-future-of-esni-in-firefox >>>>>>> ) >>>>>>> >>>>>>> *WebKit*: No signal >>>>>>> >>>>>> >>>>>> It would be reasonable to ask via >>>>>> https://github.com/WebKit/standards-positions/issues. >>>>>> >>>>> >>>>> Filed https://github.com/WebKit/standards-positions/issues/46 >>>>> >>>>> >>>>>> >>>>>>> *Web developers*: Positive ( >>>>>>> https://blog.cloudflare.com/encrypted-client-hello) >>>>>>> >>>>>>> *Other signals*: >>>>>>> >>>>>>> Ergonomics >>>>>>> >>>>>>> ECH is part of TLS, so it is largely abstracted away from web >>>>>>> platform APIs themselves. >>>>>>> >>>>>>> >>>>>>> Activation >>>>>>> >>>>>>> This is a network protocol and thus inherently requires server >>>>>>> software changes. It also requires keys deployed in the HTTPS DNS >>>>>>> record. >>>>>>> At this stage in the process, we do not expect ECH to be deployed >>>>>>> beyond a >>>>>>> few early adopters. Rather, this experiment is part of real-world >>>>>>> testing >>>>>>> for the developing protocol. The connection with the DNS record is of >>>>>>> particular note. It is possible that, due to DNS caching, etc., that the >>>>>>> DNS record we fetch is out of sync with the server instance we talk to. >>>>>>> ECH >>>>>>> has a built-in recovery mechanism to repair these mismatches. One of the >>>>>>> aims of the experiment will be to validate this mechanism. >>>>>>> >>>>>>> >>>>>>> Security >>>>>>> >>>>>>> See >>>>>>> https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni-14#section-10 >>>>>>> for security considerations in the specification >>>>>>> >>>>>>> >>>>>>> WebView application risks >>>>>>> >>>>>>> Does this intent deprecate or change behavior of existing APIs, such >>>>>>> that it has potentially high risk for Android WebView-based >>>>>>> applications? >>>>>>> >>>>>>> No WebView-specific risks >>>>>>> >>>>>>> >>>>>>> >>>>>>> Goals for experimentation >>>>>>> >>>>>>> This is a new extension to TLS. As part of the standardization >>>>>>> process, we wish to validate the design, and ensure it works, performs >>>>>>> well, etc. This is also the first time a TLS extension has been gated on >>>>>>> DNS. This introduces a new set of deployment risks. ECH includes >>>>>>> mechanisms >>>>>>> to mitigate these risks, which we also aim to validate with this >>>>>>> experiment. We'll do this by A/B testing clients with and without ECH >>>>>>> enabled, and comparing error rates and latency across all TLS >>>>>>> connections, >>>>>>> and across just connections to hostnames with ECH keys in DNS. We'll >>>>>>> also >>>>>>> be looking at how often the recovery flow is used. >>>>>>> >>>>>>> >>>>>>> Reason this experiment is being extended >>>>>>> >>>>>>> n/a >>>>>>> >>>>>>> >>>>>>> Ongoing technical constraints >>>>>>> >>>>>>> None >>>>>>> >>>>>>> >>>>>>> Debuggability >>>>>>> >>>>>>> Servers that use ECH are visible in the DevTools security panel. >>>>>>> >>>>>>> >>>>>>> Will this feature be supported on all six Blink platforms (Windows, >>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?Yes >>>>>>> >>>>>>> While supported on all platforms, ECH requires keys fetched via DNS >>>>>>> in the new HTTPS record. Chrome can currently fetch the HTTPS record >>>>>>> over >>>>>>> DoH and over our built-in DNS resolver. As of writing, the built-in DNS >>>>>>> resolver is not yet enabled on Windows (https://crbug.com/1317948) >>>>>>> and Linux (https://crbug.com/1350321). >>>>>>> >>>>>>> >>>>>>> Is this feature fully tested by web-platform-tests >>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>> ?No (see https://github.com/web-platform-tests/wpt/issues/20159) >>>>>>> >>>>>>> Flag nameencrypted-client-hello >>>>>>> >>>>>>> Requires code in //chrome?False >>>>>>> >>>>>>> Tracking bughttps://crbug.com/1091403 >>>>>>> >>>>>>> Launch bughttps://crbug.com/1349902 >>>>>>> >>>>>>> Estimated milestones >>>>>>> DevTrial on desktop 105 >>>>>>> DevTrial on Android 105 >>>>>>> >>>>>> >>>>>> When do you plan to end the experiment? M109, perhaps? >>>>>> >>>>> >>>>> Didn't have a particular set end time... depends on how long it takes >>>>> to answer our questions and how things shake out I suppose. We can >>>>> tentatively say M109 if we need an end date. (Although at this point I >>>>> suspect a lot of the milestones will get shifted over anyway.) >>>>> >>>>> >>>>>> >>>>>>> >>>>>>> Link to entry on the Chrome Platform Status >>>>>>> https://chromestatus.com/feature/6196703843581952 >>>>>>> >>>>>>> Links to previous Intent discussionsIntent to prototype: >>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/YEo4LqB7nWI >>>>>>> >>>>>>> >>>>>>> This intent message was generated by Chrome Platform Status >>>>>>> <https://chromestatus.com/>. >>>>>>> >>>>>> -- >> You received this message because you are subscribed to a topic in the >> Google Groups "blink-dev" group. >> To unsubscribe from this topic, visit >> https://groups.google.com/a/chromium.org/d/topic/blink-dev/KrPqrd-pO2M/unsubscribe >> . >> To unsubscribe from this group and all its topics, send an email to >> blink-dev+unsubscr...@chromium.org. >> To view this discussion on the web visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/df76ac9a-856e-4639-8eb0-c5658e65bc44n%40chromium.org >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/df76ac9a-856e-4639-8eb0-c5658e65bc44n%40chromium.org?utm_medium=email&utm_source=footer> >> . >> > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42KY05Qv_7t_ob0TXmyh0aCgkSqqb9CKCW3CA9gTL%3DM0Kg%40mail.gmail.com.