On Wed, Jul 04, 2018 at 05:56:07AM -0700, Eric Rescorla wrote:
> On Tue, Jul 3, 2018 at 9:48 PM, Ilari Liusvaara <ilariliusva...@welho.com>
> wrote:
> 
> > On Mon, Jul 02, 2018 at 04:39:14PM -0700, Eric Rescorla wrote:=
> > > I am working on an implementation for NSS/Firefox and I know some
> > > others are working on their own implementations, so hopefully we can
> > > do some interop in Montreal.
> > >
> > > This is at a pretty early stage, so comments, questions, defect
> > > reports welcome.
> >
> > One thing I noticed: First there is this in evaluation:
> >
> > 7.2.4.  Do not stick out
> >
> >    By sending SNI and ESNI values (with illegitimate digests), or by
> >    sending legitimate ESNI values for and "fake" SNI values, clients do
> >    not display clear signals of ESNI intent to passive eavesdroppers.
> >
> > Is that suggesting to send fake ESNI values? If so, there is this in
> > endpoint behavior:
> >
> 
> No, you would not send fake ESNI values. The idea here is that there is a
> group of IPs (associated with a big provider, then all ESNI-supporting
> clients will send ESNI to it. So the provider will stick out, but the use
> of site X versus site Y on the provider will not    stick out. And the
> provider's IPs are reasonably well known through other mechanisms, so this
> doesn't tell you much. Of course, this does not help big sites that aren't
> using shared infrastructure (e.g., Facebook), but I don't know how to do
> that.
What does "with illegitimate digests" mean then?



-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to