Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify attacker capabilities #564

Merged
merged 4 commits into from
Oct 13, 2023
Merged

Conversation

chris-wood
Copy link
Collaborator

@chris-wood chris-wood commented Oct 9, 2023

Closes #513
Closes #544

The intent here is to punt entirely on the mechanism by which messages between client-facing and backend servers are protected in transit, and simply to state the assumption that these messages do not let the attacker trivially learn information that ECH otherwise protects via encryption. Suggestions for further clarifications are welcome!

cc @dennisjackson, @davidben, @cjpatton

Copy link
Contributor

@cjpatton cjpatton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good but I want to double check that this actually resolve the issue before approving. One minor suggestion on wording.

draft-ietf-tls-esni.md Outdated Show resolved Hide resolved
@dennisjackson
Copy link
Contributor

LGTM

chris-wood and others added 2 commits October 11, 2023 08:18
@chris-wood
Copy link
Collaborator Author

@dennisjackson can I interpret your LGTM as approval? @cjpatton, are you able to take a look at the linked issues?

@dennisjackson
Copy link
Contributor

@dennisjackson can I interpret your LGTM as approval?

Yes. My two cents are that thetext is general enough to cover the various issues and specific enough to be easy to understand.

Copy link
Contributor

@cjpatton cjpatton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This addresses the concerns raised, in my opinion. It acknowledges that in Split Mode the attack surface changes in a way that ECH cannot address on its own. I think @kazuho would prefer we not describe Split Mode, but the precedent has been sent and I don't think we can change this at this point.

@chris-wood chris-wood merged commit 567b79c into master Oct 13, 2023
2 checks passed
@kazuho
Copy link
Collaborator

kazuho commented Oct 15, 2023

@chris-wood Thank you for writing this. The changes look good.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

What does ECH acceptance mean in Split Mode? Split mode correlation attacks
4 participants