Sent from my mobile device

> On Jul 4, 2018, at 2:20 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> Hi Kathleen,
> 
>> On Wed, Jul 4, 2018 at 11:10 AM, Kathleen Moriarty 
>> <kathleen.moriarty.i...@gmail.com> wrote:
>> I’m also fine with the work going forward, however it was only in March that 
>> EKR assured people concerned that they don’t need to worry about SNI being 
>> encrypted repeating similar statements previously made to the same effect.  
>> Meantime, he was working on such a solution. 
> 
> This is not really correct. As of March, I had basically given up on how to 
> do ESNI in TLS the near future and wasn't really working on it [0] and then 
> in May, prompted by suggestions by Matthew Prince and Nick Sullivan, I 
> realized that the proposal in this document could work.
> 
> Moreover, I think I've been pretty clear that I wanted to do ESNI and it was 
> just that we didn't know how. For instance, here's what I said in PATIENT:
> 
>    My evaluation of the current state of SNI encryption is that given the
>    current technical state, it will not see particularly wide deployment, with
>    the primary scenario being "at-risk" sites who are subject to censorship 
> who
>    either hide behind or co-tenant with sites which are not subject to
>    censorship. That probably isn't going to be incredibly common right now.. 
> Of
>    course, this is regrettable from the perspective of people designing these
>    protocols, but I think that's the situation.
> 
> As I said the other day, predictions are hard, especially about the future, 
> and this turns out not to have been totally right (though I also don't think 
> it's really accurate to characterize it as my saying that people don't need 
> to worry). I'm sorry if people people are surprised now. That wasn't my 
> intent, but as I said above, I was surprised too!
> 

Well, the messages on the Effects of Pervasive Encryption for Operators also 
factored into my response.  You wanted that text removed and we refused 
(rightly so).  You also had someone write a blog to have a reference that 
talked about it’s wide deployment.  The perception is from multiple 
interactions and I favor transparency.

Best,
Kathleen 

> -Ekr
> 
> [0] Just to be completely clear, there was and is ongoing work on protecting 
> SNI via HTTP connection coalescence (see Mike Bishop's presentation in 
> London), but that's a different flavor of approach, and it's not like it's 
> any secret it's happening.
> 
> 
>  
>> Kathleen 
>> 
>> > 
>> > Cheers,
>> > S.
>> > 
>> > 
>> >> 
>> >> -Ekr
>> >> 
>> >> 
>> >> 
>> >> _______________________________________________
>> >> TLS mailing list
>> >> TLS@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/tls
>> >> 
>> > <0x5AB2FAF17B172BEA.asc>
>> > _______________________________________________
>> > TLS mailing list
>> > TLS@ietf.org
>> > https://www.ietf.org/mailman/listinfo/tls
> 
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to