Hiya,

Sorry if I'm missing a bit of context...

On 02/06/2020 18:28, Christian Huitema wrote:
>                clients prevent server identification by sending
> an empty record_digest field in the ClientEncryptedCH, and 

That seems to me to be an unnecessary breach
of the do-not-stick-out requirement. In my code
it was quite easy to attempt trial decryption
(if so configured). I don't think there's an
expectation of a use-case where the number of
keys in use would be so high as to cause a problem.
So I'd prefer the client in that case to just
send random data of the usual length.

That said, ECH is sticking out a lot already
so this is not a huge deal;-)

Cheers,
S.

Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to