[TLS] Re: ECH Proxy Mode
A A <tom25519@yandex.com> Wed, 11 September 2024 09:35 UTC
Return-Path: <tom25519@yandex.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2A4EC151071 for <tls@ietfa.amsl.com>; Wed, 11 Sep 2024 02:35:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.379
X-Spam-Level:
X-Spam-Status: No, score=-1.379 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=yandex.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MtbedSebWi0F for <tls@ietfa.amsl.com>; Wed, 11 Sep 2024 02:35:13 -0700 (PDT)
Received: from forward500d.mail.yandex.net (forward500d.mail.yandex.net [IPv6:2a02:6b8:c41:1300:1:45:d181:d500]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93D26C14F61F for <tls@ietf.org>; Wed, 11 Sep 2024 02:35:12 -0700 (PDT)
Received: from mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net (mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net [IPv6:2a02:6b8:c12:448e:0:640:7d9c:0]) by forward500d.mail.yandex.net (Yandex) with ESMTPS id 504216159F for <tls@ietf.org>; Wed, 11 Sep 2024 12:35:09 +0300 (MSK)
Received: from mail.yandex.com (2a02:6b8:c12:3fa8:0:640:43f7:0 [2a02:6b8:c12:3fa8:0:640:43f7:0]) by mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net (mxback/Yandex) with HTTPS id 2Zf54x0X7a60-Obdo50rn; Wed, 11 Sep 2024 12:35:09 +0300
X-Yandex-Fwd: 2
To: undisclosed-recipients:;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.com; s=mail; t=1726047309; bh=8xlmI5mlm66P1OUVm0zPsU3BrkefvTbpKnjB5oiHjww=; h=References:Date:Message-Id:Cc:Subject:From; b=gKnQU4n3nnUouT2Icxov+Y7vS9XPJ5K106/XjeMpevfvrEAtCkEgy7/Ivw7bUgwgu yMF7aucdNlK+cGjZN6v8bIQ6GAbnX1Mkg8zibmOGnWBo3UZJYCor1sEtNwn4YBu2zo ILTFWh0u2mvozkoPFp01sxGG5FnSyWue9WP9d+bQ=
Authentication-Results: mail-nwsmtp-mxback-production-main-90.myt.yp-c.yandex.net; dkim=pass header.i=@yandex.com
Received: from omv3tj5zwvd3plqc.iva.yp-c.yandex.net (omv3tj5zwvd3plqc.iva.yp-c.yandex.net [2a02:6b8:c0c:8b10:0:640:4410:0]) by mail-nwsmtp-mxback-production-main-535.iva.yp-c.yandex.net (mxback/Yandex) with HTTP id nYfC8l5O7W20-BD0nM7kJ for <tom25519@yandex.com>; Wed, 11 Sep 2024 12:34:54 +0300
Received: by omv3tj5zwvd3plqc.iva.yp-c.yandex.net with HTTP; Wed, 11 Sep 2024 12:34:54 +0300
From: A A <tom25519@yandex.com>
Cc: "tls@ietf.org" <tls@ietf.org>
References: <03D6DC16-2AFE-41E8-8404-F456D67582EB@taoshu.in> <ME0P282MB5587AFB9A303CE7FABEAF008A39C2@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <C3A1FBAA-CEB9-49FD-A50F-831D86FDECC7@taoshu.in> <ME0P282MB55870395CC2C672C7A607C01A3992@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <7E16914E-3F97-4DB3-8AFD-40898A4DABD0@taoshu.in> <ME0P282MB55871BDDF016659F149743E8A39B2@ME0P282MB5587.AUSP282.PROD.OUTLOOK.COM> <CDD4A0D6-188E-4CC6-B976-F5B4C384C56E@taoshu.in>
MIME-Version: 1.0
X-Mailer: Yamail [ http://yandex.ru ] 5.0
Date: Wed, 11 Sep 2024 17:35:09 +0800
Message-Id: <82811726047107@mail.yandex.com>
Content-Transfer-Encoding: base64
Content-Type: text/html; charset="utf-8"
Message-ID-Hash: YEJQGC6XAD7GBEV2VBKJ4PY7PXZEI3RI
X-Message-ID-Hash: YEJQGC6XAD7GBEV2VBKJ4PY7PXZEI3RI
X-MailFrom: tom25519@yandex.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS] Re: ECH Proxy Mode
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Qks53Sml0jMghNZXvTdD92egmjE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Dear Raghu,The MiTM solution may works for self-host, because the user controls both the browser andthe proxy node. However, it is not acceptable for public proxy, because the middle nodecould see all the plain traffic between the user and the target, which is a far more seriousproblem than the leak of SNI.The only obstacle of my envisioned ECH-based SNI proxy is that the server side accept confirmationmust be placed in the SH.random field, which will be further used to generate the master secret.As a result, the middle proxy node can't respond this confirmation on behalf of the backed server.The ECH-based SNI proxy is just a possible by-product of ECH. It's not a big problem if wecan not implement such proxy. However, my real concern is the deployment rate of the current draft.The current design requires both the client and backend server to be modified to be ECH-aware.For solo web site, as the administrator has the full control and there is no inter node, they mayupgrade quickly.But there are far too many sites using some proxy service, for example, Cloudflare, AWS ALB, etc.For stability consideration, service provider like AWS does not upgrade their infrastructure very quickly.If web site use AWS LB as their TLS terminal edge server, it may cost too long time to deploy ECH.Apart from technical issues, deploy ECH does almost no benefit to this business. I doubt if they areinterested in ECH.On the other hand, let's recall the origin of the server side confirmation.According to the original discussion https://github.com/tlswg/draft-ietf-tls-esni/issues/274" rel="noopener noreferrer nofollow">https://github.com/tlswg/draft-ietf-tls-esni/issues/274> In the current spec, the server provides no indication of whether the inner or outer ClientHello (CH) was used. This means the client must do trial decryption to make this determination, which creates complexity and potentially raises security concerns.It seems that the main consideration of the accept_confirmation is just to simplify the client side logic.This simplification may cause a slow deployment of ECH. I am wondering if it really make sense.The ECH is very complicated itself. The purpose of such an complicated protocol is toprotect the privacy of the Internet, so we should in favor of the easy deployment instead ofof the simplified implementation. If the simplification is the first consideration, the ECH should notbe considered at all.On Sep 11, 2024, at 15:16, Raghu Saxena <poiasdpoiasd@live.com> wrote:By the way, you may be interested in this project: https://github.com/quininer/nosni-proxy" rel="noopener noreferrer nofollow">https://github.com/quininer/nosni-proxy , which has a similar idea, but instead to completely strip SNI, and relying on TLS interception. One could think of an alternative, basically like the Cloudflare MiTM model you mentioned, except self-hosted with certificates manually trusted. Then the DoH server would return the IP of this server, which would allow an ECH-TLS connection to it, but then performs a separate TLS handshake with the real origin server.
It is not as elegant as what you mentioned since now there is a need to manually trust certificates, but could still be an approach.
,_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-leave@ietf.org
- [TLS] Re: ECH Proxy Mode Raghu Saxena
- [TLS] Re: ECH Proxy Mode 涛叔
- [TLS] Re: ECH Proxy Mode Christopher Patton
- [TLS] Re: ECH Proxy Mode Raghu Saxena
- [TLS] Re: ECH Proxy Mode 涛叔
- [TLS] Re: ECH Proxy Mode Raghu Saxena
- [TLS] Re: ECH Proxy Mode 涛叔
- [TLS] Re: ECH Proxy Mode A A
- [TLS] Re: ECH Proxy Mode 涛叔
- [TLS] Re: ECH Proxy Mode A A
- [TLS] Re: ECH Proxy Mode Naomi Kirby
- [TLS] ECH Proxy Mode 涛叔
- [TLS] Re: ECH Proxy Mode A A