Certainly, within the umbrella of "Network Security", privacy is a
category. ECH falls into that category.

As with many things in life there is also a trade-off that ECH brings
along. More privacy, at possibly less "Network Security" (not a less secure
TLS connection), as noted in some of the other emails.

Thanks,

On Thu, Oct 20, 2022 at 12:14 AM Salz, Rich <rs...@akamai.com> wrote:

>
>    - ECH is not a security feature per se.
>
>
>
> The ability of a third party to not be able to see who is communicating is
> something that many would consider a security feature. Within the US
> infosec community there was a great deal of uproar about NSA data
> collection, even if it was “just” (sarcastic airquotes) metadata. Some may
> disagree with that assessment, as you apparently do, but please don’t make
> definitive statements like the above.
>
>
>
>    - But yes, what I am talking about is disabling ECH by an
>    entity/appliance other than the endpoints. One that is authoritative for
>    the public name, of course
>
>
>
> The simplest way for an entity to disable ECH is to not have the DNS
> records with the ECH keys.  If that means that TLS-inspecting middleboxes
> now need to also become DNS servers, many would say that is the cost of
> interception. Many would probably also say that’s not a reasonable cost to
> impose, but I expect them to be in the minority viewpoint at the IETF.
>
>
>
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to