On 10/9/2019 10:16 PM, Rob Sayre wrote:
> On Wed, Oct 9, 2019 at 8:06 PM Eric Rescorla <e...@rtfm.com
> <mailto:e...@rtfm.com>> wrote:
>
>
>         I don't think that's quite what I'm proposing. I'm proposing
>         (optionally) sending the SNI with a client certificate.
>
>
>     What are you trying to accomplish by doing that?
>
>
> I want to keep the SNI encrypted in TLS hops that use client
> certificates, but where ESNI won't work.
>
> For example, how is the SNI transmitted in the parens here:
>
> [ Client ] -----> (ESNI) -----> [ CDN ] -----> (???) -----> [ Origin ] 
>
> I don't think a DNS-based solution like ESNI will work for that second
> hop, because the origin tends to be identified by an IP address rather
> than a domain name.


If the Origin is identified by IP address, an observer on path between
CDN and Origin just has to look at the IP address to find out whatever
information was in the SNI.

Do you have a specific threat in mind? It cannot be about just the CDN
and the Origin server, because observers can easily assess whether CDN X
serves origin O. Are you concerned that the observer will correlate
incoming traffic from client to CDN with outgoing traffic from CDN to
Origin?

This is an issue common to pretty much every relay service. I understand
that Tor has specific algorithms for dealing with that, involving for
example insertion of delays at the relay points. Is that the kind of
work that you have in mind? I am not sure that it would fit easily
within the TLS charter, but there are other working groups...

-- Christian Huitema


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to