On Fri, Oct 11, 2019 at 1:08 AM Eric Rescorla <e...@rtfm.com> wrote: > > > On Wed, Oct 9, 2019 at 10:16 PM Rob Sayre <say...@gmail.com> wrote: > >> On Wed, Oct 9, 2019 at 8:06 PM Eric Rescorla <e...@rtfm.com> wrote: >> >>> >>>> I don't think that's quite what I'm proposing. I'm proposing >>>> (optionally) sending the SNI with a client certificate. >>>> >>> >>> What are you trying to accomplish by doing that? >>> >> >> I want to keep the SNI encrypted in TLS hops that use client >> certificates, but where ESNI won't work. >> >> For example, how is the SNI transmitted in the parens here: >> >> [ Client ] -----> (ESNI) -----> [ CDN ] -----> (???) -----> [ Origin ] >> >> I don't think a DNS-based solution like ESNI will work for that second >> hop, because the origin tends to be identified by an IP address rather than >> a domain name. >> > > I feel like we're perhaps talking past each other, so I'm going to start > back at the beginning. > > In the ordinary case of Client -> Origin or Client -> CDN, the SNI > principally serves to tell the server which origin the client wants and > thus which certificate to serve. For this reason, it has to go in the CH. >
In general, I agree with you. But only because client certificates are relatively rare for end users. If a client certificate is required, the server probably can't send application data in its first response. > > In the case of CDN -> Origin, it seems like SNI could serve the same > purpose (say that the origin server is hosting multiple servers), in which > case it seems like the same requirements apply. OTOH, if the origin server > just hosts one origin, then you could potentially have the SNI delivered > later (as you suggest), but then why have SNI delivered at all? > Two reasons: 1) the SNI could contain subdomain data, like "username.example.com" 2) if there is a client certificate, the SNI might be relevant in deciding whether to accept it I understand that the intermediary (CDN, etc) will be able to observe the SNI, but it's not clear why it's ok that any passive observer to the origin should be able to. thanks, Rob
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls