They seem to be operating reliably in numerous products/deployments though.
Regardless, Nick brought my attention to Section 8.2, where proxies/middleboxes are not involved, but the same questions are elicited. Thanks, On Thu, Oct 20, 2022 at 12:34 AM Christian Huitema <huit...@huitema.net> wrote: > So called "transparent" proxies relie on lies. The price of lies is of > course brittleness. Configured proxies could be made robust. > > -- Christian Huitema > > On Oct 19, 2022, at 5:55 PM, Safe Browsing <safebrowsing...@gmail.com> > wrote: > > > Hi Christian, > > For transparent proxies, no. > > Thanks > > On Wed, Oct 19, 2022 at 4:51 AM Christian Huitema <huit...@huitema.net> > wrote: > >> If one connects to a proxy, shouldn't the SNI point to the name of the >> proxy? >> >> -- Christian Huitema >> On 10/18/2022 8:49 PM, Hannes Tschofenig wrote: >> >> Giving someone, other than those managing the endpoints, the ability to >> disable a security feature like ECH is problematic. >> >> >> >> If I read your email correctly then I believe that’s what you are >> suggesting. I hope I am missing something. >> >> >> >> Ciao >> >> Hannes >> >> >> >> *From:* TLS <tls-boun...@ietf.org> <tls-boun...@ietf.org> *On Behalf Of * >> Safe Browsing >> *Sent:* Wednesday, October 19, 2022 4:56 AM >> *To:* Eric Rescorla <e...@rtfm.com> <e...@rtfm.com> >> *Cc:* TLS@ietf.org >> *Subject:* Re: [TLS] Securely disabling ECH >> >> >> >> Hi Eric, >> >> >> >> Picking up on your (earlier) reply here. >> >> >> >> Though it would be possible to adjust the setting in browsers (disabling >> ECH), this is not an ideal/sufficient method of disabling ECH. >> >> >> >> Some reasons it is not sufficient: >> >> - Not all TLS clients are browsers >> >> - Not all browsers (or other TLS clients) may implement this ability >> >> - In a multi-browser environment it means that it needs to be configured >> in more than one place, each using a different method of achieving the same >> (cumbersome) >> >> - even worse if there are other, non-browser, ECH supporting clients >> present for which ECH needs to be disabled >> >> >> >> It seems therefore that the ideal place to achieve this is within the >> protocol itself. Making ECH disabling client agnostic. >> >> >> >> The draft does consider this by allowing ECH to be disabled - as >> discussed in this thread. Albeit at the cost of an extra round trip. >> However, the connection retry logic in the presence of ECH disabling is >> currently optional. >> >> >> >> The draft states, in Section 8.2: >> >> “ this may trigger the retry logic” >> >> >> >> It seems this text must change to: >> >> “ this MUST trigger the retry logic” >> >> >> >> In order to ensure functional connections in a TLS client agnostic >> manner, in the presence of protocol level ECH disabling. >> >> >> >> I would appreciate your thoughts/input. >> >> >> >> On Oct 8, 2022, at 7:41 PM, Eric Rescorla <e...@rtfm.com> wrote: >> >> >> >> If you are able to install a new trust anchor, then you should be able to >> use the enterprise configuration mechanisms in browsers to disable ECH. >> >> >> >> -Ekr >> >> >> >> >> >> On Fri, Oct 7, 2022 at 8:40 PM Safe Browsing <safebrowsing...@gmail.com> >> wrote: >> >> Hi Rich, >> >> >> >> When I say “authoritative”, I mean it in the true TLS sense, in the way >> that I believe the ECH draft also suggests and requires. >> >> >> >> In other words, the middlebox serves a cert to the client that is >> cryptographically valid for the said public name of the client facing >> server. >> >> >> >> How can that be when the client facing server guards its private key >> properly? By re-signing the server certificate on the middlebox with a >> private key, local to the middle box only, for which the corresponding >> certificate has been installed in the trust store of the client, before >> sending it on to the client. Only after the original server certificate >> has been validated properly on the middlebox, of course. Message digests >> being managed accordingly/appropriately. >> >> >> >> That is a very typical setup for most (all?) TLS inspection devices (next >> gen firewalls and such). >> >> >> >> Thus this part of ECH, requiring the middlebox to be authoritative for >> the server, is well understood and prolifically exercised in inspected TLS >> sessions today. What is new is that these connections can now fail/close, >> in the “securely disabling ECH” case, and the onus is on the TLS client, >> not the application, to retry the connection without ECH. >> >> >> >> I am after such a client, if one exists already. >> >> >> >> Thank you. >> >> >> >> Sent from my phone >> >> >> >> On Oct 7, 2022, at 11:41 AM, Salz, Rich <rs...@akamai.com> wrote: >> >> >> >> >> >> - Client <-> *Middlebox* <-> Client-facing server <-> Backend server >> >> >> >> - With "Middlebox" really meaning a middlebox like a firewall or >> similar. >> >> >> >> The middlebox is not allowed to modify traffic between the client and the >> server. Doing so would mean that the packets the client sent are not the >> ones that the server received, and the two message digests would disagree. >> (If you think about things, it **has** to be this way, otherwise TLS >> would not be able to provide integrity guarantees.) >> >> >> >> - From the draft, ECH seems to be designed to still allow successful >> TLS connection establishment if the encrypted_client_hello extension is >> dropped from the ClientHello on a conforming middlebox. Provided that the >> middlebox is authoritative for the client-facing server's public name, as >> reported/delivered by DNS to the client. We can assume that this is the >> case here. >> >> >> >> I do not understand what you mean by this. The word “authoritative” is >> used to mean that it has a certificate and keypair and can do TLS >> termination. DNS giving the client a particular IP address is not >> authoritative. It can be confusing because DNS terminology uses >> authoritative to mean that a particular entity can prepare data used for >> DNS responses. But it is not authoritative in the TLS sense. >> >> >> >> I think your questions can be answered with those two overall corrections >> above. If not, please continue the thread. (And feel free to repost from >> your note since I trimmed for brevity.) >> >> >> >> _______________________________________________ >> TLS mailing list >> TLS@ietf.org >> https://www.ietf.org/mailman/listinfo/tls >> >> IMPORTANT NOTICE: The contents of this email and any attachments are >> confidential and may also be privileged. If you are not the intended >> recipient, please notify the sender immediately and do not disclose the >> contents to any other person, use it for any purpose, or store or copy the >> information in any medium. Thank you. >> >> _______________________________________________ >> TLS mailing listTLS@ietf.orghttps://www.ietf.org/mailman/listinfo/tls >> >>
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls