[TLS] Re: ECH Proxy Mode

A A <tom25519@yandex.com> Wed, 11 September 2024 09:35 UTC

Return-Path: <tom25519@yandex.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2A4EC151071 for <tls@ietfa.amsl.com>; Wed, 11 Sep 2024 02:35:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.379
X-Spam-Level:
X-Spam-Status: No, score=-1.379 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=yandex.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MtbedSebWi0F for <tls@ietfa.amsl.com>; Wed, 11 Sep 2024 02:35:13 -0700 (PDT)
Received: from forward500d.mail.yandex.net (forward500d.mail.yandex.net [IPv6:2a02:6b8:c41:1300:1:45:d181:d500]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93D26C14F61F for <tls@ietf.org>; Wed, 11 Sep 2024 02:35:12 -0700 (PDT)
Received: from mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net (mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net [IPv6:2a02:6b8:c12:448e:0:640:7d9c:0]) by forward500d.mail.yandex.net (Yandex) with ESMTPS id 504216159F for <tls@ietf.org>; Wed, 11 Sep 2024 12:35:09 +0300 (MSK)
Received: from mail.yandex.com (2a02:6b8:c12:3fa8:0:640:43f7:0 [2a02:6b8:c12:3fa8:0:640:43f7:0]) by mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net (mxback/Yandex) with HTTPS id 2Zf54x0X7a60-Obdo50rn; Wed, 11 Sep 2024 12:35:09 +0300
X-Yandex-Fwd: 2
To: undisclosed-recipients:;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.com; s=mail; t=1726047309; bh=8xlmI5mlm66P1OUVm0zPsU3BrkefvTbpKnjB5oiHjww=; h=References:Date:Message-Id:Cc:Subject:From; b=gKnQU4n3nnUouT2Icxov+Y7vS9XPJ5K106/XjeMpevfvrEAtCkEgy7/Ivw7bUgwgu yMF7aucdNlK+cGjZN6v8bIQ6GAbnX1Mkg8zibmOGnWBo3UZJYCor1sEtNwn4YBu2zo ILTFWh0u2mvozkoPFp01sxGG5FnSyWue9WP9d+bQ=
Authentication-Results: mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net; dkim=pass header.i=@yandex.com
Received: from omv3tj5zwvd3plqc.iva.yp-c.yandex.net (omv3tj5zwvd3plqc.iva.yp-c.yandex.net [2a02:6b8:c0c:8b10:0:640:4410:0]) by mail-nwsmtp-mxback-production-main-535.iva.yp-c.yandex.net (mxback/Yandex) with HTTP id nYfC8l5O7W20-BD0nM7kJ for <tom25519@yandex.com>; Wed, 11 Sep 2024 12:34:54 +0300
Received: by omv3tj5zwvd3plqc.iva.yp-c.yandex.net with HTTP; Wed, 11 Sep 2024 12:34:54 +0300
From: A A <tom25519@yandex.com>
Cc: "tls@ietf.org" <tls@ietf.org>
References: <03D6DC16-2AFE-41E8-8404-F456D67582EB@taoshu.in> <ME0P282MB5587AFB9A303CE7FABEAF008A39C2@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <C3A1FBAA-CEB9-49FD-A50F-831D86FDECC7@taoshu.in> <ME0P282MB55870395CC2C672C7A607C01A3992@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <7E16914E-3F97-4DB3-8AFD-40898A4DABD0@taoshu.in> <ME0P282MB55871BDDF016659F149743E8A39B2@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <CDD4A0D6-188E-4CC6-B976-F5B4C384C56E@taoshu.in>
MIME-Version: 1.0
X-Mailer: Yamail [ http://yandex.ru ] 5.0
Date: Wed, 11 Sep 2024 17:35:09 +0800
Message-Id: <82811726047107@mail.yandex.com>
Content-Transfer-Encoding: base64
Content-Type: text/html; charset="utf-8"
Message-ID-Hash: YEJQGC6XAD7GBEV2VBKJ4PY7PXZEI3RI
X-Message-ID-Hash: YEJQGC6XAD7GBEV2VBKJ4PY7PXZEI3RI
X-MailFrom: tom25519@yandex.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS] Re: ECH Proxy Mode
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Qks53Sml0jMghNZXvTdD92egmjE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

- all
 
I don't think need to use random, we can use Session ID, which is deprecated since TLS 1.3. Random is used to derive master key, AFAIK.
 
 
11.09.2024, 17:29, "涛叔" <hi=40taoshu.in@dmarc.ietf.org>:
Dear Raghu,
 
The MiTM solution may works for self-host, because the user controls both the browser and
the proxy node. However, it is not acceptable for public proxy, because the middle node
could see all the plain traffic between the user and the target, which is a far more serious
problem than the leak of SNI.
 
The only obstacle of my envisioned ECH-based SNI proxy is that the server side accept confirmation
must be placed in the SH.random field, which will be further used to generate the master secret.
As a result, the middle proxy node can't respond this confirmation on  behalf of the backed server.
 
The ECH-based SNI proxy is just a possible by-product of ECH. It's not a big problem if we
can not implement such proxy. However, my real concern is the deployment rate of the current draft.
 
The current design requires both the client and backend server to be modified to be ECH-aware.
 
For solo web site, as the administrator has the full control and there is no inter node, they may
upgrade quickly.
 
But there are far too many sites using some proxy service, for example, Cloudflare, AWS ALB, etc.
For stability consideration, service provider like AWS does not upgrade their infrastructure very quickly.
If web site use AWS LB as their TLS terminal edge server, it may cost too long time to deploy ECH.
 
Apart from technical issues, deploy ECH does almost no benefit to this business. I doubt if they are
interested in ECH.
 
On the other hand, let's recall the origin of the server side confirmation.
 
According to the original discussion https://github.com/tlswg/draft-ietf-tls-esni/issues/274" rel="noopener noreferrer nofollow">https://github.com/tlswg/draft-ietf-tls-esni/issues/274
 
> In the current spec, the server provides no indication of whether the inner or outer ClientHello (CH) was used. This means the client must do trial decryption to make this determination, which creates complexity and potentially raises security concerns. 
 
It seems that the main consideration of the accept_confirmation is just to simplify the client side logic.
This simplification may cause a slow deployment of ECH. I am wondering if it really make sense.
 
The ECH is very complicated itself. The purpose of such an complicated protocol is to
protect the privacy of the Internet, so we should in favor of the easy deployment instead of
of the simplified implementation. If the simplification is the first consideration, the ECH should not
be considered at all.
 
On Sep 11, 2024, at 15:16, Raghu Saxena <poiasdpoiasd@live.com> wrote:
 
By the way, you may be interested in this project: https://github.com/quininer/nosni-proxy" rel="noopener noreferrer nofollow">https://github.com/quininer/nosni-proxy , which has a similar idea, but instead to completely strip SNI, and relying on TLS interception. One could think of an alternative, basically like the Cloudflare MiTM model you mentioned, except self-hosted with certificates manually trusted. Then the DoH server would return the IP of this server, which would allow an ECH-TLS connection to it, but then performs a separate TLS handshake with the real origin server.

It is not as elegant as what you mentioned since now there is a need to manually trust certificates, but could still be an approach.

,

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-leave@ietf.org