Is it possible to use Session ID in Client Hello, which is obsoleted in TLS 1.3, to transfer enctypred SNI? If it looks random enough, attacker could't distinguish Session ID is encrypted SNI or not.
 
It may have some restrictions, for example, the SNI maybe couldn't longer than Session ID (32 bytes).
 
An another option is use TLS 1.3's PSK. It may break the limit of 32 bytes when using Session ID and able to transfer the whole Encrypted Client Hello, but it may more distinguishable compare with using Session ID.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to