Hi Raghu,
On 06/10/2023 10:45, Raghu Saxena wrote:
Specifically, I am concerned about the "public name" field in the
ECHConfig. For services such as cloudflare, they can "hide" everything
behind a single domain (e.g. "cloudflare-ech.com"). However, for
someone who just owns a single domain (e.g. "hub.com"), what would the
"suggested value" be?
Section 6.1.7 implies it should NOT be an IPv4 address. If I do not
wish to leak the real domain, is it "acceptable" to use something like
"fakedomain.com"?
The server needs to be able to answer a TLS connection for the ECH
public name or you risk an outage if the ECHConfigs get out of sync as
then clients will get a TLS error page if they can't get through to the
public name.
If the public_name leaks domain in anyway, I think it would be quite
unfortunate, at least for bypassing DPI-blocks. From what I
understand, the purpose of public_name is only if the server doesn't
support ECH, but if a client retrieved an ECHConfig, why shouldn't the
client just skip this field? I fear it will become a situation like
the initial SNI extension - even when websites do not need it,
browsers' TLS stacks send it anyway, causing leakage.
For instance, in India, a popular website, let's call it "hub.com", is
blocked via SNI. However, the website itself does NOT rely on SNI, It
is possible to open a pure TLS connection to it via IP, it serves the
TLS cert for "hub.com" so the handshake can be completed, and then the
website will load as normal. I verified this by manually using
"openssl s_client", WITHOUT SNI. But since Firefox/Chrome will always
send SNI, the ISPs can block it.
If the server can answer with the correct certificate without SNI, then
it must be the only site hosted at that IP. This means that the ISP can
also just block the IP without any collateral damage. The same thing is
true if ECH connections didn't expose an SNI at all, they'd stick out
and could be blocked for that reason.
I would describe ECH primarily as a technology for improving privacy.
Unfortunately, I don't think it's any kind of silver bullet for
censorship resistance.
Best,
Dennis
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls