Hi Tiru,

Thanks for the review.  I've filed it as 
https://github.com/tlswg/draft-ietf-tls-svcb-ech/issues/21.

1. I've opened a PR to add examples: 
https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/22
2. This text was heavily debated in DNSOP: 
https://mailarchive.ietf.org/arch/msg/dnsop/zOx_7v4GShtMX0MMj5djSCxs7hk/.  
While I would love to have a stronger recommendation here, I would prefer not 
to reopen this issue.
3. The text makes the privacy properties clear.  I don't think it is 
appropriate or useful for us to instruct implementors about how to describe 
these properties to their users.
4. I've opened a PR to add a reference: 
https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/23
5. This seems like a topic that is related to ECH generally, not specific to 
the "ech" SVCB parameter, so I don't think it should be covered in this 
document.

--Ben Schwartz

________________________________
From: tirumal reddy <kond...@gmail.com>
Sent: Tuesday, December 10, 2024 1:39 AM
To: draft-ietf-tls-svcb-ech....@ietf.org 
<draft-ietf-tls-svcb-ech....@ietf.org>; <tls@ietf.org> <tls@ietf.org>; Last 
Call <last-c...@ietf.org>
Subject: Secdir last call review of draft-ietf-tls-svcb-ech

This Message Is From an External Sender

Reviewer: Tirumaleswar Reddy K
Review result: Ready with issues

I have reviewed this document as part of the SEC area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

1. A SVCB RRSet containing some RRs with "ech" and some without is
   vulnerable to a downgrade attack: a network intermediary can block
   connections to the endpoints that support ECH, causing the client to
   fall back to a non-ECH endpoint.  This configuration is NOT
   RECOMMENDED.

Comment> Please mention scenarios where such mixed behavior may be acceptable. 
Highlighting the exceptions would be helpful.

2. ECH ensures that TLS does not disclose the SNI, but the same
   information is also present in the DNS queries used to resolve the
   server's hostname.  This specification does not conceal the server
   name from the DNS resolver.  If DNS messages are sent between the
   client and resolver without authenticated encryption, an attacker on
   this path can also learn the destination server name.  A similar
   attack applies if the client can be linked to a request from the
   resolver to a DNS authority.

Comment> While authenticated encryption provides protection against active 
attackers, the privacy benefits are negated if the DNS resolver itself is 
malicious. It may be useful to recommend using trusted DNS resolvers.

3. It will be helpful to provide recommendations to endpoint implementations 
not to mislead end-users that "ECH" would provide the same level of security 
fully anonymizing solutions like Tor,      "ECH" may not provide any privacy 
because of the reasons discussed in 2nd paragraph of Security Considerations 
Section.

4. The discussion on the anonymity set could benefit from examples or 
references that illustrate how traffic analysis might narrow it.

5. The behaviour recommendation for middleboxes acting as a TLS proxy should be 
discussed.

Cheers,
-Tiru
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to