Thanks, Stephen! For the record, Cloudflare's test server is
crypto.cloudflare.com. Like draft-13.esni.defo.ie:8413, you can trigger HRR
by offering only a P-384 key share in the initial ClientHello.

Best,
Chris P.

On Tue, Sep 14, 2021 at 5:12 PM Stephen Farrell <stephen.farr...@cs.tcd.ie>
wrote:

>
> Hiya,
>
> I've put up a bunch of server instances for ECH draft-13
> interop as described below and at [1].
>
> - OpenSSL s_server: draft-13.esni.defo.ie:8413 using all algs
> - OpenSSL s_server: draft-13.esni.defo.ie:8414 likely forces
>                      HRR as it only likes P-384 for TLS
> - lighttpd: draft-13.esni.defo.ie:9413
> - nginx: draft-13.esni.defo.ie:10413
> - apache: draft-13.esni.defo.ie:11413
> - haproxy: draft-13.esni.defo.ie:12413 shared mode
>             (haproxy terminates TLS)
> - haproxy: draft-13.esni.defo.ie:12414 split mode
>             (haproxy only decrypts ECH)
>
> Those all use the latest branch of my OpenSSL fork [2]. There
> are links to the server source for each at [1]. Each of the
> above have keys (well, the same key:-) published in DNS.
>
> I also think my (of course still radically imperfect:-) code
> interops with boringssl and the test server Cloudflare have
> put up. I've still to try get HRR working in split mode but
> will be working on that shortly, other than that though, the
> spec seems implementable, if complex for my wee brain:-)
>
> Those aren't setup to be resilient as I'd like to see some
> detail if they crash, so in that case, or if stuff just
> doesn't work, mail me and we can figure a way to test stuff.
>
> Cheers,
> S.
>
> [1] https://defo.ie/
> [2] https://github.com/sftcd/openssl/tree/ECH-draft-13a
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to