Raghu,

I certainly am not advocating believing in only SNI by itself,
an advanced DPI system will use dozens of metadata features, SNI being only one.

Indeed, in those cases where there is a single service behind an IP address,
there is no reason for SNI to be present (although it often is anyway)
and can certainly be faked.

As I said in my ID you can't rely on client-side software.
99% of clients don't know what they are doing, and won't keep their protections 
up-to-date.
And MiTM of any type is an abomination - we don't want to replace one attack 
with a worse one.

In any case I am talking about a large ISP network, not a small or campus-size 
one where admins
can set up proxies for individual users.

Y(J)S


-----Original Message-----
From: Raghu Saxena <poiasdpoi...@live.com>
Sent: Thursday, July 10, 2025 11:50 AM
To: tls@ietf.org
Subject: [EXTERNAL] [TLS] Re: FW: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt

External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe

Dear Yaakov,

I would be careful about relying on plaintext SNI for detecting malicious 
flows. The SNI parameter is controlled by the client, and can even be ignored 
by the server. One would think that any decent malware author would either not 
set the SNI, or just "spoof" it - in which case if threat analysis software is 
relying on this field, it'd think the flow is legitimate and let is pass, which 
is probably even worse. In fact, recently when traveling on British Airways, I 
was able to (ab)use SNI, to use their "Free Messaging WiFi" for arbitrary 
traffic [0].

In environments where it is essential that network administrators inspect 
users' traffic to detect malicious flows, I think the better solution is to 
install MiTM CAs on client, which then allow the network admin to decrypt TLS 
and inspect the traffic. If this is then considered as an invasion of privacy 
in that setting, I'd argue inspecting SNI is the same; the client would rather 
hide it if they can. In fact, personally, I think browser's behavior to set SNI 
by default is actually harmful to privacy, since there are very popular 
websites (Top25) that function fine without the SNI extension, yet ISPs (such 
as "Jio" in India - from my experience) use this leakage to block them.

If you want to argue that the users' are "OK" with monitoring of the domains, 
but not of their entire TLS traffic, then the network admin can setup an 
HTTP(S) proxy (without MiTM), which would be able to log the domains via the 
`CONNECT` header, while blocking all other traffic. Once again, if this level 
of control over client's traffic is not possible, one should rethink if the 
"admins" should be able to peek into the SNI at all.

Regards,
Raghu Saxena

[0] https://www.saxrag.com/tech/reversing/2025/06/01/BAWiFi.html


On 7/2/25 10:43 PM, Yaakov Stein wrote:
> Just in case anyone missed this ...
>
> Y(J)S
>
> -----Original Message-----
> From: internet-dra...@ietf.org <internet-dra...@ietf.org>
> Sent: Tuesday, July 1, 2025 4:52 PM
> To: Yaakov Stein <yst...@allot.com>; Yaakov Stein <yst...@allot.com>
> Subject: New Version Notification for
> draft-stein-tls-ech-considered-harmful-00.txt
>
> A new version of Internet-Draft
> draft-stein-tls-ech-considered-harmful-00.txt
> has been successfully submitted by Yaakov (J) Stein and posted to the IETF 
> repository.
>
> Name:     draft-stein-tls-ech-considered-harmful
> Revision: 00
> Title:    ECH Considered Harmful
> Date:     2025-07-01
> Group:    Individual Submission
> Pages:    7
> URL:      
> https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.txt
> Status:   
> https://datatracker.ietf.org/doc/draft-stein-tls-ech-considered-harmful/
> HTML:     
> https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-stein-tls-ech-considered-h
> armful
>
>
> Abstract:
>
>     Encrypted Client Hello is designed to enhance personal privacy, in
>     particular obstructing the ability of communications service
>     providers (but not Over The Top service providers) to map packet
>     flows to applications.  While mostly ineffective in attaining this
>     goal, it does severely hamper network-based detection of malicious
>     flows, thus exposing end-users to various security risks that were
>     previously avoidable.
>
>
>
> The IETF Secretariat
>
>
> This message is intended only for the designated recipient(s). It may contain 
> confidential or proprietary information. If you are not the designated 
> recipient, you may not review, copy or distribute this message. If you have 
> mistakenly received this message, please notify the sender by a reply e-mail 
> and delete this message. Thank you.
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to