On Fri, Feb 17, 2017 at 9:47 PM, John R Levine <jo...@taugh.com> wrote:
> 1. Multiple domains on the same host set the same SNI record. Possession >> of a global DNS database is no help to the adversary. The adversary still >> cannot distinguish the domains. This is the intended use. >> > > Now I'm really confused. If the SNI value is just a cover name, and the > client's going to send the real name later, why not just pick a fixed > impossible cover name like SNI.INVALID and skip the SNI lookup? > In that case, one would simply omit the SNI, since it is optional. The draft specifies that an empty RDATA instructs the client to omit the SNI. Currently, most TLS servers do not require SNI at all, so this will often work ... but there's no way for the client to know ahead of time if it's safe to omit, so the clients always include it. The reason to allow non-empty RDATA is to support servers that serve multiple multi-domain certificates from a single IP address, dispatched by SNI. This is common on CDNs and other large internet serving systems. > Presumably if this became at all popular, everyone will send SNI.INVALID > so it wouldn't leak anything interesting. > > Regards, > John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY > Please consider the environment before reading this e-mail. https://jl.ly >
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop