On Wed, 16 Oct 2024, Martin Thomson wrote:

A retry fallback happens with the public name.  The server that offers ECH 
lists a public name.  If the ECH config (for key A) turns out to be unusable, 
the server offers a regular handshake with that public name, where it offers 
retry_configs.

So, while the connection might attempt a connection with ech.example, the connection is 
"completed" with public.example.  The process of validating that connection 
doesn't really involve ECH, it's just an ordinary certificate.  But the DNS record for 
ech.example established that *for the purposes of negotiating ECH* public.example is 
authorized to provide a config.  That part is independent of the keys that are used and 
therefore OK to have immutable.

Ohhh. now I get it! It solves my misunderstanding and my concern about
being dead in the water if a key was lost. Thanks for this answer!

Now please add this clearly to the document :)

Thanks Ekr for the DNS explanation too. I think it would still be good
to suggest .invalid for the server to keep things as simple as possible.

Paul

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to