On 6/2/2020 11:44 AM, Salz, Rich wrote:

> Trial description scares me.  Perhaps that's not a rationale fear -- one of 
> the points of CDN support is a large anonymity set -- but I worry about the 
> DoS possibilities. Especially if QUIC picks this up (now trivial to fake 
> "client IP") and if some large mobile manufacturers move to use this as the 
> default as I've heard they are considering.

I am looking at a very specific use case: mobile servers. Suppose that
you use TLS to connect from a mobile client to a mobile server using an
untrusted network, such as a Wi-Fi network in an airport. Neither the
client not the server want to reveal their identity when using the
network. When using TLS, they will use ECH to hide finger-printable data
such as SNI, ALPN, or QUIC initial parameters. But the record digest in
the ECH blob is also an unique identifier of the server. Sending that in
the clear will disclose the identity of the server if the ECHConfigis
public. Even if server and authorized clients keep the structure
private, the unique record digest still allows for tracking the server's
movements. In practice, server privacy pretty much requires trial
decryption -- any hint at server identity or key identity can be used to
track the server.

Of course, this is a specialized use case. This kind of behavior is not
required at all if the client-facing server is public, such as in the
CDN case. Servers will have to explicitly allow the feature, and yes
this is a trade-off between privacy and exposure to DDOS. The point of
section 10.3 is precisely to outline that trade-off.

-- Christian Huitema


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to