Hiya,

On 21/10/2022 00:44, Rob Sayre wrote:
I think the WG might want to consider how it spends its time. The ECH draft
has been adopted as a work item. In case it’s not obvious, this one is
going to be deployed prior to its document status.

The above seems correct and apposite.

There’s no point in
arguing in the standards work.

That's badly phrased I think. Personally I think there's no
point in this thread (other than to ponder the interestingly
unidentified OP), but there can well be a point to arguments
about ECH (for example, based on having coded it up for
haproxy,(*) I'd still like to revisit the HRR and split-mode
combo even if it turns out we can't figure out a better way
to handle that).

Cheers,
S.

(*) Out of curiosity: has anyone else implemented a split-
mode client-facing server that handles HRR?


thanks,
Rob


On Thu, Oct 20, 2022 at 11:48 Safe Browsing <safebrowsing...@gmail.com>
wrote:

Certainly, within the umbrella of "Network Security", privacy is a
category. ECH falls into that category.

As with many things in life there is also a trade-off that ECH brings
along. More privacy, at possibly less "Network Security" (not a less secure
TLS connection), as noted in some of the other emails.

Thanks,

On Thu, Oct 20, 2022 at 12:14 AM Salz, Rich <rs...@akamai.com> wrote:


    - ECH is not a security feature per se.



The ability of a third party to not be able to see who is communicating
is something that many would consider a security feature. Within the US
infosec community there was a great deal of uproar about NSA data
collection, even if it was “just” (sarcastic airquotes) metadata. Some may
disagree with that assessment, as you apparently do, but please don’t make
definitive statements like the above.



    - But yes, what I am talking about is disabling ECH by an
    entity/appliance other than the endpoints. One that is authoritative for
    the public name, of course



The simplest way for an entity to disable ECH is to not have the DNS
records with the ECH keys.  If that means that TLS-inspecting middleboxes
now need to also become DNS servers, many would say that is the cost of
interception. Many would probably also say that’s not a reasonable cost to
impose, but I expect them to be in the minority viewpoint at the IETF.





_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Attachment: OpenPGP_0x5AB2FAF17B172BEA.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to