From c796c1a766bf55c3c4d241b0a37288230d5c4bc2 Mon Sep 17 00:00:00 2001 From: Eric Rescorla Date: Sun, 24 Nov 2024 15:13:34 -0800 Subject: [PATCH] Update draft-ietf-tls-esni.md Co-authored-by: Martin Thomson --- draft-ietf-tls-esni.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/draft-ietf-tls-esni.md b/draft-ietf-tls-esni.md index 32e730c9..0058c984 100644 --- a/draft-ietf-tls-esni.md +++ b/draft-ietf-tls-esni.md @@ -1415,7 +1415,7 @@ less useful without encryption of DNS queries in transit mechanisms. A malicious client-facing server could distribute unique, per-client ECHConfig structures as a way of tracking clients across subsequent connections. On-path adversaries which know about these unique keys could also track clients in this -way by observing TLS connection attempts. +way by observing TLS connection attempts. The cost of this type of attack scales linearly with the desired number of target clients. Moreover, DNS caching behavior makes targeting individual users