On Tue, Aug 11, 2020 at 11:52 PM Peter Gutmann <pgut...@cs.auckland.ac.nz>
wrote:

> ... in reference to a question someone else asked about ECH and TLS
> 1.3, since it's not defending against anything the censors are doing I
> can't
> see what its presence or absence would do.  Something like ECH seems like
> classic inside-out design, "here is our cool piece of crypto trickery, and
> whatever it happens to defend against is the threat".
>

Censors do use the unencrypted SNI. See:
https://tools.ietf.org/id/draft-irtf-pearg-censorship-03.html#sni

That doesn't mean an encrypted ClientHello will solve all of the problems
we've discussed, of course.

That said, most of the linked papers I've read could be possibly-overfit ML
models that study older TLS versions without ECH.

Their underlying point could be correct, but the data is old, and usually
not public or reproducible.

thanks,
Rob
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to