I have risen similar discussion before and have tried to suggest some 
solutions, but none of them got any support.

Here is the previous discuss thread, just FYI

https://mailarchive.ietf.org/arch/msg/tls/HlwYX16Y4W2BevKTpI6a81eO1JE/

> On Mar 13, 2024, at 13:20, Raghu Saxena <poiasdpoi...@live.com> wrote:
> 
> Are comments restricted strictly to members of the working group? If so, 
> please ignore this E-Mail.
> 
> I'd previously tried to raise an issue regarding requirements of a 
> public_name in the ECHConfig in the mailing list [0], and when I didn't get 
> much response there, even on Github [1], where I was further met by silence. 
> I assumed this meant since I am not in the working group I am not allowed to 
> participate in discussions, but seeing the "Last Call" I thought I'd try one 
> last time.
> 
> My concern relies around the fact that by requiring a public_name in the 
> ECHConfig, and clients "SHOULD" pass it, means we are losing basically all 
> the benefit we initially had with ESNI, since now some part is leaked anyway. 
> This was not an issue in original ESNI. Although the draft allows for a 
> client to not use this value, and/or for a server to not validate it 
> ("SHOULD" rather than "MUST"), in practice all of the most popular clients 
> (i.e. browsers) will probably end up using / sending it. We saw this for SNI, 
> where even websites which don't need it (e.g. a very popular adult website), 
> browsers will still send it, and this becomes a vector for censorship / 
> blocking.
> 
> If this requirement is unlikely to change, my question then becomes - it is  
> "acceptable", as a website operator who does not wish to leak the domain name 
> in the ECHOuter's plaintext SNI, to specify the "public_name" in the 
> ECHConfig as something random (e.g. "example.com"), acknowledging the fact 
> that as a server operator, I will disregard any value the client passes for 
> the SNI in the ClientHello anyway? Or is there another recommended approach 
> if I do not want the actual domain to be leaked on the wire. This is coming 
> as an individual operator, with no CDNs to hide behind (e.g. 
> `cloudflare-ech.com`).
> 
> Lastly, I also struggle to understand the value of this field. From reading 
> the RFC, it seems it is mostly only applicable if the server rejects ECH. I 
> would think this happens if the server does not support ECH, and therefore 
> should not have had an ECHConfig published anyway- or the client is unable to 
> satsify the server's ECH requirements. In both cases, I would think it is on 
> the client to fallback an purposely initiate a non-ECH TLS handshake, rather 
> than "downgrade" the connection. Forgive me if I am missing something 
> obvious, but as someone who used ESNI successfully back when it was in draft 
> status, and was happy with no SNI being leaked, I am unhappy that it has 
> returned.
> 
> Regards,
> 
> Raghu Saxena
> 
> [0] https://mailarchive.ietf.org/arch/msg/tls/HUG1CU0Q4PorZ7fD0yafVfj7VUY/
> 
> [1] 
> https://github.com/tlswg/draft-ietf-tls-esni/issues/572#issuecomment-1780859252
> 
> On 3/12/24 06:00, Joseph Salowey wrote:
>> This is the working group last call for TLS Encrypted Client Hello [1].  
>> Please indicate if you think the draft is ready to progress to the IESG and 
>> send any comments to the list by 31 March 2024.  The comments sent by Watson 
>> Ladd to the list [2] on 17 February 2024 will be considered last call 
>> comments.
>> 
>> Thanks,
>> 
>> Joe, Deirdre, and Sean
>> 
>> [1] https://datatracker.ietf.org/doc/draft-ietf-tls-esni/
>> [2] https://mailarchive.ietf.org/arch/msg/tls/XUCFuNBSQfSJclkhLW-14DZ0ETg/
>> 
>> 
>> 
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
> <OpenPGP_0xA1E21ED06A67D28A.asc>_______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to