On Wed, Jul 4, 2018 at 6:08 AM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> On Wed, Jul 04, 2018 at 05:56:07AM -0700, Eric Rescorla wrote:
> > On Tue, Jul 3, 2018 at 9:48 PM, Ilari Liusvaara <
> ilariliusva...@welho.com>
> > wrote:
> >
> > > On Mon, Jul 02, 2018 at 04:39:14PM -0700, Eric Rescorla wrote:=
> > > > I am working on an implementation for NSS/Firefox and I know some
> > > > others are working on their own implementations, so hopefully we can
> > > > do some interop in Montreal.
> > > >
> > > > This is at a pretty early stage, so comments, questions, defect
> > > > reports welcome.
> > >
> > > One thing I noticed: First there is this in evaluation:
> > >
> > > 7.2.4.  Do not stick out
> > >
> > >    By sending SNI and ESNI values (with illegitimate digests), or by
> > >    sending legitimate ESNI values for and "fake" SNI values, clients do
> > >    not display clear signals of ESNI intent to passive eavesdroppers.
> > >
> > > Is that suggesting to send fake ESNI values? If so, there is this in
> > > endpoint behavior:
> > >
> >
> > No, you would not send fake ESNI values. The idea here is that there is a
> > group of IPs (associated with a big provider, then all ESNI-supporting
> > clients will send ESNI to it. So the provider will stick out, but the use
> > of site X versus site Y on the provider will not    stick out. And the
> > provider's IPs are reasonably well known through other mechanisms, so
> this
> > doesn't tell you much. Of course, this does not help big sites that
> aren't
> > using shared infrastructure (e.g., Facebook), but I don't know how to do
> > that.
>
> What does "with illegitimate digests" mean then?
>

I didn't write this text, but I agree that it's in conflict with the
requirement that
you abort with an unknown key. We went through some design variants and
this looks like a remnant of a previous one.

-Ekr


>
> -Ilari
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to