On Sat, Oct 12, 2019 at 12:11 AM Salz, Rich <rs...@akamai.com> wrote:

>
>
>    - How does a request of the form "username.example.com
>    
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__username.example.com&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=ujs6Lkbc_IGTiuLdcDk8syhWP1v9lNpztl9OxZuCvas&s=hBGHuzwfs66lIYRw2lkpneJu72vkeC9m5HH46EJ0i3c&e=>"
>    get through a CDN to an Origin while leaving the SNI encrypted on the wire?
>
>
>
> The CDN needs to see the decrypted SNI.
>

Agreed.



> If the CDN and origin share the ESNI keys, the CDN can just pass the
> original ESNI value along.  If the CDN and origin do not share ESNI keys,
> then the CDN will have to re-encrypt.  If that is an issue you haven’t
> explained why or I missed.
>

It's definitely one approach. I am not sure which keys should be used for
the CDN -> Origin traffic, though. I suggested sending the SNI with the
client cert, because it seemed simpler if client certs are already being
used (an option I recommend for CDN -> Origin traffic).

EKR's Host header suggestion may also be viable, but my goal is actually to
make some TLS-level decisions about traffic based on the SNI. EKR's
proposal also assumes some level of Host header / SNI divergence is allowed
by the Origin host. These policies are not clear to me. For example, I'm
not sure what rules a Cloudflare to Google Cloud Platform link would need
to follow (this is a common enough setup that they have an egress
agreement).


>
>    - I also disagree with the argument that ESNI is pointless when “IPv6
>    uniquely identifies the origin”.
>
>
>
> Can you explain why?
>

I agree that a unique IPv6 address would expose the fact that a CDN is
communicating with an Origin, but I also think subdomain data could be used
for tracking, and so the SNI should still be encrypted.

thanks,
Rob
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to