On Tue, Jun 2, 2020, at 10:28 AM, Christian Huitema wrote:
> 
> 
> On 6/2/2020 5:44 AM, Christopher Wood wrote:
> > On Mon, Jun 1, 2020, at 10:06 PM, Christian Huitema wrote:
> >> This draft looks really good. I just have two questions of clarification.
> 
> I am not sure that I understand the point made in appendix B, Total 
> Client Hello Encryption. The text in that appendix explains that "The 
> design described here only provides encryption for the SNI, but not for 
> other extensions, such as ALPN." This seems to contradict the design 
> description in the introduction, "The design in this document 
> introduces a new extension, called Encrypted Client Hello (ECH), which 
> allows clients to encrypt the entirety of their ClientHello to a 
> supporting server." Am I correct to assume that the text in appendix B 
> is a leftover from the previous version of the draft?
> > Yep! I'd opt to remove this text entirely, but if others want to keep it I 
> > suppose we can update the text accordingly.  That's probably the simple 
> > option, yes.
> >> I am also not sure on how we could implement the "Optional Record 
> Digests and Trial Decryption" methods described in section 10.3. The 
> syntax description in section 5 specifies the record digest as "opaque 
> record_digest<0..2^16-1>", and defines that field as containing "A 
> cryptographic hash of the ECHConfig structure from which the ECH key 
> was obtained". Would it be correct to implement the "optional record 
> digest" method by just encoding a zero length field?
> > Indeed, that was the intent. Would you prefer a different way? 
> Length 0 is a fine way to mark the absence of an optional component. 
> But I would like a short mention of that either in section 5 or in 
> section 10.3. For example:
> 
> 
> 
> 10.3.  Optional Record Digests and Trial Decryption
> 
>    Optional record digests may be useful in scenarios where clients and
>    client-facing servers do not want to reveal information about the
>    client-facing server in the "encrypted_client_hello" extension.  In
>    such settings, 
> 
> >>                clients prevent server identification by sending
> >> an empty record_digest field in the ClientEncryptedCH, and 
> 
>                   servers must perform trial decrypt upon receipt of an
>    empty record digest, which may exacerbate DoS attacks.  Specifically,
>    an adversary may send malicious ClientHello messages, i.e., those
>    which will not decrypt with any known ECH key, in order to force
>    wasteful decryption.  Servers that support this feature should, for
>    example, implement some form of rate limiting mechanism to limit the
>    damage caused by such attacks.
> Fairly minimal change, but it would clarify the intent and avoid 
> interop problems.

Would you mind creating a PR for this? :-)

Thanks,
Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to