Hi both,

On 29/07/2019 23:52, Steven Valdez wrote:
> Without GREASE, a server who doesn't have keys can't respond with any of
> the existing responses (esni_accept is wrong since it can't decode the
> ESNI, esni_retry_request is wrong since it can't provide keys for the
> client to use on the retry). The only valid response would be a new record
> type that says it doesn't support ESNI, which becomes equivalent to just
> not sending the ESNI extension back in the EncryptedExtensions.
> 
> With GREASE, I don't know if it's particularly useful to fake the response
> in the EncryptedExtensions, since network adversaries won't be able to see
> the contents, I suppose its presence might slightly change the size of the
> encrypted payload, though record padding could prevent that.

Right it's the size that matters;-) I don't care if that's via
this extension or not. ISTM that yes, producing a response to
greased ESNI that doesn't stand out is an accepted requirement.
And for the case in point, I think (but don't claim to be right)
that a 50:50 distribution of ~16 payload octets or else
ESNIKeys-sized things seems right.

On 29/07/2019 23:53, Ben Schwartz wrote:> It sounds like you're asking
for a middle ground for servers between
> "supports ESNI (and has ESNIKeys)" and "doesn't support ESNI".
> Maybe you  could explain the utility of this middle ground?
>
> From my perspective, I'd rather encourage real implementations
> of ESNI than enable fake ones.

Agreed. Not that documenting a corner case is encouraging
the corner case of course:-) That seems more like being as
complete as one can.

I suspect this is more an issue about what code to write for a
server instance that boots but hasn't yet gotten the values for
ESNIKeys loaded for whatever reason. Or where disk access fails
for a while. Or where... <insert weird case here>, but the server
code still has to do something.

Cheers,
S.


> 
> 
> On Mon, Jul 29, 2019 at 3:34 PM Stephen Farrell <stephen.farr...@cs.tcd.ie>
> wrote:
> 
>>
>>
>> On 29/07/2019 23:32, Steven Valdez wrote:
>>> A server that doesn't have ESNI keys configured shouldn't be responding
>> to
>>> ESNI and should instead just ignore the ESNI extensions (as if it didn't
>>> know what it was).
>>
>> Why?
>>
>> Thanks,
>> S.
>>
> 
> 

Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to