On Wed, Dec 2, 2015 at 10:00 AM, Salz, Rich <rs...@akamai.com> wrote:

> > I think that is false. One could easily use the "cleartext" SNI field
> and insert an encrypted value. A hash of the name would be a simple example
> but not a secure example, of course.
>
> Encrypted SNI doesn't give you the kind of protection you think that it
> does.  We (me and a colleague) did a pretty thorough analysis that showed
> this.  It was not a conclusion we expected, or wanted, to reach.   It was
> presented at the TLS Interim before the IETF in Toronto.  Slides should be
> online.  (For example, the adversary will know the IP address or might not
> care about false positives, etc.)
>
> In spite of this, another colleague (Brian Sniffen) came up with a way to
> do it at the tail end of the Seattle interim.  Encrypt the "true" SNI in
> the semi-static DH key of a "fronting" site.  And then the front decrypts
> the true SNI and forwards to the obscured site. Ekr and dkg presented it in
> Yokohama, but not very well. :)  They're presumably working on something
> better.


Yes, expect an email with a summary of our current thinking in the next
day or so.

-Ekr

_______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to