-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify attacker capabilities #564
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good but I want to double check that this actually resolve the issue before approving. One minor suggestion on wording.
LGTM |
Co-authored-by: Christopher Patton <[email protected]>
@dennisjackson can I interpret your LGTM as approval? @cjpatton, are you able to take a look at the linked issues? |
Yes. My two cents are that thetext is general enough to cover the various issues and specific enough to be easy to understand. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This addresses the concerns raised, in my opinion. It acknowledges that in Split Mode the attack surface changes in a way that ECH cannot address on its own. I think @kazuho would prefer we not describe Split Mode, but the precedent has been sent and I don't think we can change this at this point.
@chris-wood Thank you for writing this. The changes look good. |
Closes #513
Closes #544
The intent here is to punt entirely on the mechanism by which messages between client-facing and backend servers are protected in transit, and simply to state the assumption that these messages do not let the attacker trivially learn information that ECH otherwise protects via encryption. Suggestions for further clarifications are welcome!
cc @dennisjackson, @davidben, @cjpatton