Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ECH guidance conflicts with ECH-SVCB #71

Open
bemasc opened this issue Jan 17, 2025 · 0 comments
Open

ECH guidance conflicts with ECH-SVCB #71

bemasc opened this issue Jan 17, 2025 · 0 comments

Comments

@bemasc
Copy link

bemasc commented Jan 17, 2025

The current draft says

If the client supports TLS Encrypted Client Hello (ECH) discovery through SVCB records {{!SVCB-ECH=I-D.ietf-tls-svcb-ech}}, depending on the client's preference to handle ECH, the client SHOULD sort addresses with ECH keys taking priority to maintain privacy when attempting connection establishment.

ECH-SVCB says

A SVCB RRSet containing some RRs with "ech" and some without is vulnerable to a downgrade attack ... This configuration is NOT RECOMMENDED. Zone owners who do use such a mixed configuration SHOULD mark the RRs with "ech" as more preferred (i.e. lower SvcPriority value) than those without, in order to maximize the likelihood that ECH will be used in the absence of an active adversary.

In essence, there is a discrepancy as to whose responsibility it is to prioritize ECH.

I think the ECH-SVCB view should probably prevail.

Philosophically, the client cannot make the service more secure than the operator intends it to be.

Operationally, it seems valuable to be able to test ECH by placing it on a less-used, lower-priority endpoint, and it would be very surprising to discover that this effectively inverts the stated priority for some (large?) segment of clients.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant