Hi Marwan,

You seem to be concerned that the ECH Public Name might reveal information
that is not already disclosed by the destination IP, in cases where the use
of a certain IP address by a certain operator is not otherwise known to the
observer in question.  This is true!  In ECH the correct configuration in
this case is to assign an unrelated Public Name to each IP pool.  This
change does not reduce privacy, and avoids revealing a linkage between
different IP addresses that are not otherwise visibly linked.  If you think
this is not sufficiently clear, we can probably add text to the draft
describing how to choose good Public Names.

On the topic of smaller hosts: not every IETF specification is equally
useful to everyone, and this is fine.  ECH provides more benefit when
applied to large hosts, but it doesn't _reduce_ privacy for anyone, so it
is safe to deploy on essentially any TLS server.

On the topic of the "anonymity trilemma": this claim does not apply.  ECH
is not an "anonymous communication protocol" as defined in this paper (or
otherwise), as it does not attempt to conceal the user's intended
destination from the ECH operator.

--Ben Schwartz

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to