Numerous ways a client can "stick out" have been identified, to the point where 
it's trivial to block connections using real ECH, regardless of the length of 
the config_id, which was why I thought we'd largely dropped the attempt not to 
stick out.



> On Feb 17, 2021, at 8:35 AM, Jonathan Hoyland <jonathan.hoyl...@gmail.com> 
> wrote:
> 
> I know that ECH doesn't provide security against probing attackers, but such 
> an attacker could easily maintain a list of active keys, and drop connections 
> using them.
> If the key ID is very long, this would be highly effective at allowing grease 
> ECH connections, but blocking real ECH connections.
> 
> An adversary using this strategy against a one byte id would have high 
> collateral damage, but against an eight byte id would virtually none.
> 
> Providing some resistance to probing adversaries is a nice-to-have, even if 
> we can't provide complete protection.
> 
> My preference would be for a shorter id.
> 
> Regards,
> 
> Jonathan
> 
> On Wed, 17 Feb 2021 at 16:25, Stephen Farrell <stephen.farr...@cs.tcd.ie 
> <mailto:stephen.farr...@cs.tcd.ie>> wrote:
> 
> 
> On 17/02/2021 16:00, Eric Rescorla wrote:
> > On Tue, Feb 16, 2021 at 4:44 PM Stephen Farrell <stephen.farr...@cs.tcd.ie 
> > <mailto:stephen.farr...@cs.tcd.ie>>
> > wrote:
> > 
> >>
> >>
> >> On 17/02/2021 00:34, Eric Rescorla wrote:
> >>> How is it any harder to manage a multi-octet server-chosen value than a
> >>> single-octet server-chosen value?
> >>
> >> Easier for the library on the server side. If it's >1 octet
> >> then someone will want some semantics. If ==1 then they'll
> >> have to accept none and possible collisions so it can be
> >> handled independently inside the library.
> >>
> > 
> > The server is free to enforce 1 byte.
> 
> A server operator would be free to do that. The person
> writing the code likely would not be as some server
> operator would also be free to try impose semantics
> on a multibyte field.
> 
> S.
> 
> 
> > 
> > -Ekr
> > 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org <mailto:TLS@ietf.org>
> https://www.ietf.org/mailman/listinfo/tls 
> <https://www.ietf.org/mailman/listinfo/tls>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to