Hey everyone,

I just wanted to chime in and mention that I am also disappointed that 
split-mode ECH can't be implemented without the backend server being ECH aware, 
and this has prevented me from deploying ECH on my network.

I have a small homelab of servers that I run behind a reverse proxy, which uses 
the SNI extensions to direct inbound connections to the backend server, and I 
have wildcard DNS records setup to direct all subdomains on my network to the 
reverse proxy. It works great, I don't have to touch my DNS provider to add new 
services, but it does leak the serer names to an eavesdropper.

So, I was hoping to upgrade the reverse proxy to support ECH, I was hoping that 
I could add an ECH record and have the reverse proxy decrypt the 
ClientHelloInner and forward it off to the backend server.

Unfortunately, this doesn't work if the backend server doesn't support ECH as 
it won't know that it needs to generate the accept_confirmation and the client 
will mistakenly think that the handshake is proceeding with the 
ClientHelloOuter even if the proxy can decrypt the ClientHelloInner just fine.

I'm sure I could make this work anyways, either by adding exceptions  for the 
backends that don't support ECH or having the reverse proxy terminate the TLS 
connections. But I am disappointed that I couldn't realize the privacy gains of 
ECH without having to upgrade the backend servers first.

Anyways, thank you for all the effort put into this draft, it's a great step 
forward for privacy.

Thanks,
Naomi

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to