Hiya,

On 28/07/2019 19:07, Dmitry Belyavsky wrote:
> Dear Stephen,
> 
> I published a draft describing "Fake SNI" designed for the same purpose. It
> allows (at least in theory) to cheat those who blocks all the handshakes
> containing ESNI.

Yes, I recall that. The question below was only really about
draft-ietf-tls-esni-04 though.

Cheers,
S.

> 
> вс, 28 июля 2019 г., 15:25 Stephen Farrell <stephen.farr...@cs.tcd.ie>:
> 
>>
>> Hiya,
>>
>> ESNI drafts -03 and -04 envisage that the ESNIKeyublic_name
>> and the TLS h/s cleartext SNI are the same. I'd expect that
>> they mostly will be.
>>
>> But they don't have to be. A client could provide a way to
>> use a client-chosen cleartext SNI when using ESNI to encrypt
>> the real SNI.
>>
>> For example, my openssl build allows this for s_client. I've
>> a colleague who's got a first build of curl using that that
>> also allows such a local over-ride. I think other command-line
>> clients might be likely to also support that kind of thing, if
>> for no other reason than the existence of the draft-02 version
>> that's deployed and has no public_name. But I guess being able
>> to do a local over-ride may also be generally useful, while
>> not being so useful for web browsers. For example, if a given
>> public_name value is being censored, clients might at that
>> point want to use something else.
>>
>> On the server side, my code also make no checks that the
>> cleartext SNI used was the same as the public_name. And I
>> don't think that causes any problems, so maybe ought be
>> allowed too.
>>
>> I don't think allowing this (if the WG decide to) requires
>> any major change to the spec, but there are a couple of
>> language changes needed in section 5.1.3 and I guess we
>> should add a sentence to the effect that using the public_name
>> value from ESNIKeys in the cleartext SNI is recommended
>> if you've no other value but is not required.
>>
>> Cheers,
>> S.
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>>
> 

Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to