________________________________
From: Linda Dunbar via Datatracker <nore...@ietf.org>
Sent: Wednesday, April 9, 2025 3:58 PM
To: ops-...@ietf.org <ops-...@ietf.org>
Cc: draft-ietf-tls-svcb-ech....@ietf.org 
<draft-ietf-tls-svcb-ech....@ietf.org>; last-c...@ietf.org 
<last-c...@ietf.org>; tls@ietf.org <tls@ietf.org>
Subject: Opsdir ietf last call review of draft-ietf-tls-svcb-ech-07

...

> Mixed SVCB RRSets with and without the “ech” parameter are vulnerable to
> downgrade attacks, yet may occur in multi-provider environments or during
> staged rollouts. Clear operational guidance is needed to mitigate these risks,
> such as prioritizing ECH-capable endpoints using SvcPriority. Deployments
> involving CDNs or multi-CDN setups add complexity around coordination of ECH
> keys and consistent DNS records, and would benefit from best practice
> recommendations.

This situation is addressed in detail already in the Security Considerations: 
https://www.ietf.org/archive/id/draft-ietf-tls-svcb-ech-07.html#section-8-1.  I 
don't believe we have any further recommendations.

> Additionally, diagnosing ECH failures can be difficult due to the lack of
> fallback and visibility. The draft should recommend logging and monitoring
> strategies to help operators detect misconfigurations.

I don't believe we have any relevant recommendations for logging or monitoring. 
 Any such logging would likely not be related to the DNS records, so those 
recommendations would be in draft-ietf-tls-esni or a later draft.

> Key rotation, TTL
> management, and rollback procedures are also important but not addressed.

draft-ietf-tls-esni does already discuss these topics:

Key rotation: 
https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni#name-maintain-forward-secrecy
Rollback: 
https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni#name-misconfiguration-and-deploy
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to