Hiya,

On 13/02/2019 22:15, Christopher Wood wrote:
> 
> 
> [1] https://github.com/tlswg/draft-ietf-tls-esni/pull/124

I just re-read that. I've a question: why tie the version
change to this PR and not the I-D rev? I'd prefer if we
make the change to 0xff02 when -03 is published. (I don't
care which PR does that, but wouldn't like to see every
PR bump that number.)

Aside from that I think it's ok (though I may find other
issues when implementing later) with two caveats that can
be handled now or later:

1. The DNS RR structure still needs fixing but that is likely
better handled separately. (By "fixing" I mean a new RR type
but also that it needs to be designed for DNS admins as well
and not only for TLS implementers which is the current case.
(I'm not saying what might or might not make it more dnsops
friendly, just that that needs to be checked/done sometime.)

2. I don't think the text below ought be included, it's not
the job of this WG to design MITM attacks. (Or maybe I've
misinterpreted it?)

"The public name, however, makes this protocol compatible with
deployments that use correctly-implemented MITM proxies. If the
client has cached an ESNIKey for the origin server, the MITM
proxy will process the cleartext SNI field and terminate a
connection to the public name instead. If the client is
configured to trust the proxy's certificate, it will accept
the connection as valid for the public name and retry with
ESNI disabled."

I also don't think I'd implement that fallback in my openssl
fork. Earlier text says to complete the h/s but to not make
that visible to the application layer and the above seems to
conflict with that. I could hold my nose were that in -03 as it
has no effect really, but I'll whine about it later for sure;-)

> [2] https://github.com/tlswg/draft-ietf-tls-esni/pull/125

I like this one. But the "SHOULD send" and "MUST pad to 260"
seem a bit OTT to me, though I could live with 'em for now.
So consider these nits, not objections:

- Rather than "SHOULD send", it may be better to say something
like "SHOULD frequently send" and leave it to clients to decide
how often to grease. Wouldn't that have the same effect?

- Maybe add that even TLS1.3 clients that don't really do ESNI
MAY grease ESNI? (A bit weird but hey why not?:-)

- Padding to 260 is IIRC the max that works. A CH with such
padding is ~600 bytes. Seems like a waste of bytes to me and
it could stick out depending on real ESNI padding_lengths.
Maybe consider something like "pad to a length that matches
recent traffic" and leave it to clients to figure out what
might stick out less. (I'm not sure every server will ask
for padding to 260 as CF do;-)

Cheers,
S.



Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to