-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add text describing deployment impacts of no SNI access #566
Conversation
Co-authored-by: Christopher Patton <[email protected]>
Co-authored-by: Christopher Patton <[email protected]>
LGTM. Do you want to add something about untrusted environments? e.g. "In an environment where the network operator controls the endpoint devices, but is concerned about malware or similar exfiltrating data, the SNI field is unsuitable for use as a control even in the absence of ECH. This is because malware is able to spoof the value in an SNI field already, and can even fool security appliances which try to 'double-check' the websites hosted by the target server. ECH does not materially change this situation." |
@dennisjackson I worked in your suggested paragraph. Please take another look! |
Two small suggestions, otherwise LGTM. |
Co-authored-by: Dennis Jackson <[email protected]>
Co-authored-by: Dennis Jackson <[email protected]>
This lifts text from the ECH deployment considerations draft for inclusion in the ECH draft. It is not uncommon for protocol documents to address deployment considerations head on, and this PR attempts to do so. As always, feedback on the exact phrasing is welcome.
cc @dennisjackson, @davidben, @martinthomson, @cjpatton, @sftcd