*   ECH is not a security feature per se.

The ability of a third party to not be able to see who is communicating is 
something that many would consider a security feature. Within the US infosec 
community there was a great deal of uproar about NSA data collection, even if 
it was “just” (sarcastic airquotes) metadata. Some may disagree with that 
assessment, as you apparently do, but please don’t make definitive statements 
like the above.


  *   But yes, what I am talking about is disabling ECH by an entity/appliance 
other than the endpoints. One that is authoritative for the public name, of 
course

The simplest way for an entity to disable ECH is to not have the DNS records 
with the ECH keys.  If that means that TLS-inspecting middleboxes now need to 
also become DNS servers, many would say that is the cost of interception. Many 
would probably also say that’s not a reasonable cost to impose, but I expect 
them to be in the minority viewpoint at the IETF.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to