TL;DR:  
I suggest you consider hosting a side meeting at IETF 115 in London.

>    **Short setup**: There is more attention than ever on Internet
    operations from non-Internet governance and, in this context, it is
    possible that ECH presents a greater risk to the Internet than
    benefit, if deployed. And as a result, it is possible that servers and
    content operators *may* have more reasons not to deploy.

It is *possible* but based on who is participating in the ECH drafting and 
discussions, it seems those organizations have probably already done their 
analysis. (Have you asked your employer, for example?)

>    There are really only two ways to populate the outer-SNI. One way is a
    fixed name that easily identifies the content operator

If you don't think that potential attackers know the IP addresses of the 
biggest potential ECH sites you're wrong. That kind of large-scale blocking 
isn't based on domain name, but rather the IP address.

>    In addition, there is an argument to be made that ECH could lead to
    the loss of some small operators (e.g. universities and bedroom closet
    servers) that feel forced to move their service to larger providers
    because ECH offers no additional privacy and squarely leaves small
    providers behind.

I am curious why you think they will be left behind.  ECH support is coming to 
open source TLS stacks, and many DNS servers are already able to allow custom 
RRsets.

I am also unclear what you are trying to do. You don't want to stop ECH 
development, but what? Add a cautionary tale for would-be adopters?  Have you 
seen Andrew Campling's draft on the subject?

        /r$


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to