Re: [TLS] ECH draft-13 servers for interop testing

Christopher Patton <cpatton@cloudflare.com> Wed, 15 September 2021 14:54 UTC

Return-Path: <cpatton@cloudflare.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73BAA3A1BC7 for <tls@ietfa.amsl.com>; Wed, 15 Sep 2021 07:54:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.596
X-Spam-Level:
X-Spam-Status: No, score=-2.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.499, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, WEIRD_PORT=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cloudflare.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FIEHRFahUW6L for <tls@ietfa.amsl.com>; Wed, 15 Sep 2021 07:54:05 -0700 (PDT)
Received: from mail-qv1-xf31.google.com (mail-qv1-xf31.google.com [IPv6:2607:f8b0:4864:20::f31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A522E3A1BC5 for <tls@ietf.org>; Wed, 15 Sep 2021 07:54:05 -0700 (PDT)
Received: by mail-qv1-xf31.google.com with SMTP id 93so2025251qva.7 for <tls@ietf.org>; Wed, 15 Sep 2021 07:54:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ezYQg/Izy6XVIp+MSgs0LYKhPwMw5NsqgimtTWfo9zk=; b=eovpgXOHLoRdfI4nZca8UVdItFdS/kkyZ9R6SuCZOPc+Puiovv0BFc/vqRXUJLoHlE oG2kuxQPyRtdo1ZOjYqt3z4HxwjM3gJj21IvCBXCgBQN2ZncaB0JxLihO3/lI2sNX7q9 GzkselmcB8Y2Bt9S2vzB/9mUUZSoPwAkj02ss=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ezYQg/Izy6XVIp+MSgs0LYKhPwMw5NsqgimtTWfo9zk=; b=WxnmQWLbabn6skiWV4MKzIF00K+4cESU4VVU4ITdBkb8tV49AfIBJOttE0ZkYHkRzo BzKyPid4Cn3PVgiAeU+PK+VEqAI0666S/Ox5ltAOZ7l9FD/qUHkXuBGxJIxjozrxHlOy St36SnosxhstciZ1CGf0VLStlXFSycnlSNlyu81asyEF1q0BOMJvnMh85f1YwdKTsHY2 cMGRHeRScVRxcNtIT9JGQn2GnO1uhCsYShClysDgQRIigFoEXSI+I5mt+nJssVnWpbyF U8IVLGPWxbySyvJZi73KOrYMRyT0MJVZ3EZ84npzxbYe284dvx0vTbDivR8C8b8Pjp8K xbWg==
X-Gm-Message-State: AOAM533p590HCiTNiBKWm7ZHrCYP8SQCjbubXkZIVG3dud3/dsfY2DDi xHnQHSIj/9tCE7xvGIfbf6HGndoxYR6XUhQmQN2Wvwwm6Fx+Dg==
X-Google-Smtp-Source: ABdhPJwjxt40priqhHZ7KF2K5xet7Amyk1Jk/3BTgHWrWRcqdiaeEvn2FCBFXKd/5gm5cQKO3irIUaOvjmLfopPB+do=
X-Received: by 2002:a0c:fca2:: with SMTP id h2mr77904qvq.5.1631717643738; Wed, 15 Sep 2021 07:54:03 -0700 (PDT)
MIME-Version: 1.0
References: <eb896888-5041-091e-a967-efc06a3b6819@cs.tcd.ie>
In-Reply-To: <eb896888-5041-091e-a967-efc06a3b6819@cs.tcd.ie>
From: Christopher Patton <cpatton@cloudflare.com>
Date: Wed, 15 Sep 2021 07:53:52 -0700
Message-ID: <CAG2Zi21de=p7MgLWkJPTm2zSzq1GetLokT+v781JuTVNtc36Kg@mail.gmail.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Cc: "tls@ietf.org" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008781e005cc09dee7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/BMnQKva-m9OJ6FhxEDUdkVj1V84>
Subject: Re: [TLS] ECH draft-13 servers for interop testing
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Sep 2021 14:54:11 -0000

Thanks, Stephen! For the record, Cloudflare's test server is
crypto.cloudflare.com. Like draft-13.esni.defo.ie:8413, you can trigger HRR
by offering only a P-384 key share in the initial ClientHello.

Best,
Chris P.

On Tue, Sep 14, 2021 at 5:12 PM Stephen Farrell <stephen.farrell@cs.tcd.ie>
wrote:

>
> Hiya,
>
> I've put up a bunch of server instances for ECH draft-13
> interop as described below and at [1].
>
> - OpenSSL s_server: draft-13.esni.defo.ie:8413 using all algs
> - OpenSSL s_server: draft-13.esni.defo.ie:8414 likely forces
>                      HRR as it only likes P-384 for TLS
> - lighttpd: draft-13.esni.defo.ie:9413
> - nginx: draft-13.esni.defo.ie:10413
> - apache: draft-13.esni.defo.ie:11413
> - haproxy: draft-13.esni.defo.ie:12413 shared mode
>             (haproxy terminates TLS)
> - haproxy: draft-13.esni.defo.ie:12414 split mode
>             (haproxy only decrypts ECH)
>
> Those all use the latest branch of my OpenSSL fork [2]. There
> are links to the server source for each at [1]. Each of the
> above have keys (well, the same key:-) published in DNS.
>
> I also think my (of course still radically imperfect:-) code
> interops with boringssl and the test server Cloudflare have
> put up. I've still to try get HRR working in split mode but
> will be working on that shortly, other than that though, the
> spec seems implementable, if complex for my wee brain:-)
>
> Those aren't setup to be resilient as I'd like to see some
> detail if they crash, so in that case, or if stuff just
> doesn't work, mail me and we can figure a way to test stuff.
>
> Cheers,
> S.
>
> [1] https://defo.ie/
> [2] https://github.com/sftcd/openssl/tree/ECH-draft-13a
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>