On 11/15/2024 9:57 AM, Raghu Saxena wrote:
Hey Ed,

On 11/16/24 1:08 AM, evasi...@yandex.ru wrote:
Actually, it is not a problem for them, not at all.
As I stated in the message that you did not copy in the quote: they would filter out any Hello that has nested InnerHello. It is pretty automatic solution. As soon as implemented on DPI, this feature would not need any configuration or manual intervention. Only people that upgraded their browser would be punished (not the whole population) - they would have to look how to downgrade the browser or disable feature.

Well yes, any new TLS extension can be directly blocked by DPI if they want. I think practically the best way around such stuff would be to use existing TLS stuff which is too mainstream, e.g. an HTTPS proxy.

Ed,

This issue was flagged from the beginning of the SNI/ECH effort. Having a specific TLS extension makes the usage of ECH stand out. But on the other hand, it is pretty difficult to design an ESNI/ECH extension that does not standout, is compatible with standard TLS processing, and is not subject to attacks -- like for example replay attacks. Instead of trying to have ECH engineered to be discreet, the WG picked a design with robust engineering, and then argued that "you do not stand out if everybody does it". Suppose that every TLS Client Hello contains an ECH extension, whether they want to encrypt the SNI or not. If we had that, then your hypothetical censor would have to block every TLS connection, and that would be a very hard choice.

The ECH draft specifies a greasing mechanism that achieves exactly that. Clients can insert an ECH extension with fake values -- but only the client and the front end server know it is fake. The on-path attackers cannot tell -- they just see an ECH extension with a bunch of random bytes in it, which is not different from an ECH extension with encrypted data in it. If they block these packets, they are going to block way more that their desired targets.

You assume that the censorship will be deployed before the next browser versions are deployed, and that a browser that systematically grease the ECH extension would become immediately unusable. But blocking new versions of browsers will be very costly for the censor -- users do want the security, features and bug fixes of the new versions. We have no evidence of that happening yet.

-- Christian Huitema




_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to