Skip to content

Commit

Permalink
Add compromsied endpoint example
Browse files Browse the repository at this point in the history
  • Loading branch information
chris-wood committed Oct 12, 2023
1 parent e4a9dea commit 06c1f3a
Showing 1 changed file with 12 additions and 4 deletions.
16 changes: 12 additions & 4 deletions draft-ietf-tls-esni.md
Original file line number Diff line number Diff line change
Expand Up @@ -1199,10 +1199,18 @@ implementations will fall back to TLS without ECH in the event of disablement.
Depending on implementation details and deployment settings, use cases
which depend on plaintext TLS information may require fundamentally different
approaches to continue working. For example, in managed enterprise settings,
one approach may be to disable ECH entirely and for client implementations
to honor this request. Another approach may be to intercept and decrypt client
TLS connections. The feasibility of alternative solutions is specific to
individual deployments.
one approach may be to disable ECH entirely via via group policy and for
client implementations to honor this action. Another approach may be to
intercept and decrypt client TLS connections. The feasibility of alternative
solutions is specific to individual deployments.

In environments where the network operator controls the endpoint devices, but
is concerned about the security consequences of compromised devices, e.g., data
exfiltration, the SNI field is unsuitable for use as a control even in the
absence of ECH. This is because compromised devices can alter or spoof the
value in an SNI field already, and can even bypass security appliances which
try to 'double-check' websites hosted by the target server. ECH does not
materially change this situation.

# Compliance Requirements {#compliance}

Expand Down

0 comments on commit 06c1f3a

Please sign in to comment.