Med,

Thanks for your review. Responses below.


> # Write-up
>
> The write-up lists two implementations but I failed to find where in
these two
> the ech service parameter is supported. It seems to me that these implems
are
> more for the ECH support. Please consider updating as appropriate. Thanks.

Given that this specification is necessary for ECH, presumably those
implementations include support for this specification somewhere.


> # DISCUSS
>
> ## The specification mixes DNS client behavior and TLS client behavior.
Given
> that SVCB is a means among others to provide the ech configuration, I
would
> expect that what a TLS client does with the ech configuration (especially
how
> it feeds the connection establishment process) should be part of the ECH
base
> spec, not individual configuration mechanisms.

I don't agree with this. This specification is concerned with how the
ECHConfig structure is carried in DNS and the ECH specification is
concerned with how it is used in TLS. Given that these specifications
normatively reference each other and are part of the same cluster and
therefore will be published together, I think it's a WG decision how
to partition the text.


> ## The procedure to place a connection (including the fallback part) may
be
> impacted by the revised HE (HAPPY WG) given that HAPPY CHARTER includes
the
> following:
>
> ==
> Since the publication of RFC 8305, several changes to common protocols,
> clients, and server deployments have occurred that require a revision of
the
> algorithm. Some of these include: * Standardization and increased use of
QUIC,
> which require updating the TCP-specific parts of Happy Eyeballs. *
Introduction
> of Service Binding DNS resource records (SVCB and HTTPS RRs) that provide
> richer service information and add priorities and parameters that will
change
> the sorting of addresses for Happy Eyeballs. * Preparations for the
> standardization of TLS Encrypted Client Hello, which can impact which
servers a
> client is willing to connect to based on available security properties. *
> Increased deployment and refinement of IPv6-only and IPv6-mostly networks.
>
> The HAPPY working group will deliver an updated version of the Happy
Eyeballs
> algorithm, "Happy Eyeballs Version 3", that incorporates changes to
account for
> these developments.
> ==
>
> How do we plan to manage that dependency?

Once this specification is published, the HAPPY WG will need to update
the Happy Eyeballs specification appropriately; I do not anticipate
any decisions made by that WG requiring changes to this specification.


> ## Deployment/Implementation considerations: internal API to invoke an
> underlying resolution library
>
> The TLS client may support ECH, a server may publish an ech
configuration, but
> the internal API to invoke SVCB and receive the service parameters blob
may not
> be available.
>
> How existing OS libraries behave for passing service parameters? Do they
parse
> the service parameters? Or is this passed blindly?

My understanding is that OS library support may or may not be
sufficient to implement ECH in a client. However, I believe that the
existing client-side implementations implement their own resolvers; at
least chrome and Firefox do so (Firefox, just for DoH, which is the
only time it enables ECH).



> ## Configurable behaviors and failure diagnostic
>
> CURRENT:
>    The SVCB-optional client behavior specified in (Section 3 of [SVCB])
>    permits clients to fall back to a direct connection if all SVCB
>    options fail.  This behavior is not suitable for ECH, because
>    fallback would negate the privacy benefits of ECH.  Accordingly, ECH-
>    capable SVCB-optional clients MUST switch to SVCB-reliant connection
>    establishment if SVCB resolution succeeded (as defined in Section 3
>    of [SVCB]) and all alternative endpoints have an "ech" SvcParam.
>
> Why no provision is made for customized configurations (based on a user
action)
> to control how fallback is handled?

Because that would allow an active attacker to bypass ECH by blocking
connections. We do not generally permit configuration that enables
attacks.


> Also, how users are informed about the
> reasons of connection failures?

This depends on the client, of course, but I would anticipate
something like the examples in badssl.com, such as:

https://3des.badssl.com/

-Ekr


On Wed, Apr 30, 2025 at 7:58 AM Mohamed Boucadair via Datatracker <
nore...@ietf.org> wrote:

> Mohamed Boucadair has entered the following ballot position for
> draft-ietf-tls-svcb-ech-07: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Hi Benjamin, Mike, and Erik,
>
> Thanks for the effort put into this specification.
>
> Thanks to Linda Dunbar for the OPSDIR review and to Ben for the follow-up.
>
> Glad to see this piece of work finally making it to publication after
> de-clustering with SVCB/DNR/DDR.
>
> I have a question on the write-up and some few DISCUSS points.
>
> # Write-up
>
> The write-up lists two implementations but I failed to find where in these
> two
> the ech service parameter is supported. It seems to me that these implems
> are
> more for the ECH support. Please consider updating as appropriate. Thanks.
>
> # DISCUSS
>
> ## The specification mixes DNS client behavior and TLS client behavior.
> Given
> that SVCB is a means among others to provide the ech configuration, I would
> expect that what a TLS client does with the ech configuration (especially
> how
> it feeds the connection establishment process) should be part of the ECH
> base
> spec, not individual configuration mechanisms.
>
> ## The procedure to place a connection (including the fallback part) may be
> impacted by the revised HE (HAPPY WG) given that HAPPY CHARTER includes the
> following:
>
> ==
> Since the publication of RFC 8305, several changes to common protocols,
> clients, and server deployments have occurred that require a revision of
> the
> algorithm. Some of these include: * Standardization and increased use of
> QUIC,
> which require updating the TCP-specific parts of Happy Eyeballs. *
> Introduction
> of Service Binding DNS resource records (SVCB and HTTPS RRs) that provide
> richer service information and add priorities and parameters that will
> change
> the sorting of addresses for Happy Eyeballs. * Preparations for the
> standardization of TLS Encrypted Client Hello, which can impact which
> servers a
> client is willing to connect to based on available security properties. *
> Increased deployment and refinement of IPv6-only and IPv6-mostly networks.
>
> The HAPPY working group will deliver an updated version of the Happy
> Eyeballs
> algorithm, "Happy Eyeballs Version 3", that incorporates changes to
> account for
> these developments.
> ==
>
> How do we plan to manage that dependency?
>
> ## Deployment/Implementation considerations: internal API to invoke an
> underlying resolution library
>
> The TLS client may support ECH, a server may publish an ech configuration,
> but
> the internal API to invoke SVCB and receive the service parameters blob
> may not
> be available.
>
> How existing OS libraries behave for passing service parameters? Do they
> parse
> the service parameters? Or is this passed blindly?
>
> ## Configurable behaviors and failure diagnostic
>
> CURRENT:
>    The SVCB-optional client behavior specified in (Section 3 of [SVCB])
>    permits clients to fall back to a direct connection if all SVCB
>    options fail.  This behavior is not suitable for ECH, because
>    fallback would negate the privacy benefits of ECH.  Accordingly, ECH-
>    capable SVCB-optional clients MUST switch to SVCB-reliant connection
>    establishment if SVCB resolution succeeded (as defined in Section 3
>    of [SVCB]) and all alternative endpoints have an "ech" SvcParam.
>
> Why no provision is made for customized configurations (based on a user
> action)
> to control how fallback is handled? Also, how users are informed about the
> reasons of connection failures?
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> # Title: Expand SVCB
>
> # Abstract: s/using a SVCB or HTTPS record/using a SVCB or HTTPS resource
> record (RR)
>
> # Section 2: Consider adding terms used in the document (SVCP-optional,
> SVCB-reliant)
>
> # Section 3: s/The "ech" SvcParamKey is defined for conveying/The "ech"
> SvcParamKey conveys
>
> # Section 4: The first MUST is not about server behavior. Please consider a
> better title, e.g.,
>
> s/Server behavior/Operational Considerations and TLS Server behavior
>
> # IANA: maybe helpful for readers to include a pointer where the registry
> is
> available (https://www.iana.org/assignments/dns-svcb/dns-svcb.xhtml).
>
> Cheers,
> Med
>
>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to