Remix.run Logo
weitzj 8 hours ago

Will this have an impact on Loadbalancers? Like does one have to do client side load balancing like in gRPC?

grenran 8 hours ago | parent | next [-]

My understanding is that you can use split mode to only have the load balancer decrypt the server name section, and forward the actual session and key exchange down to the backend without doing double layer encryption.

8 hours ago | parent | prev | next [-]
[deleted]
gzread 5 hours ago | parent | prev | next [-]

If your load balanced doesn't support ECH, don't tell clients to use ECH.

j16sdiz 8 hours ago | parent | prev [-]

The loadbalancer can force a downgrade .

micw 8 hours ago | parent [-]

If the load balancer can force a downgrade, an attacker can do it as well.

jeroenhd 6 hours ago | parent [-]

Only if the attacker has a valid certificate for the domain to complete the handshake with.

Relying on HTTPS and SVCB records will probably allow a downgrade for some attackers, but if browsers roll out something akin to the HSTS preload list, then downgrade attacks become pretty difficult.

DNSSEC can also protect against malicious SVCB/HTTPS records and the spec recommends DoT/DoH against local MitM attacks to prevent this.

johnisgood 4 hours ago | parent [-]

> but if browsers roll out something akin to the HSTS preload list, then downgrade attacks become pretty difficult.

Can you explain why, considering it is at the client's side ("browsers")?

jeroenhd 4 hours ago | parent [-]

If browsers remember which domains do ECH and refuse to downgrade to non-ECH connections after, the way the HSTS cache forces browsers to connect over HTTPS despite direct attempts to load over HTTP, then you only need an entry in the browser database to make downgrade attacks to accomplish SNI-snooping impossible.

For HSTS, browsers come with a preloaded list of known-HTTPS domains that requests are matched against. That means they will never connect over HTTP, rather than connect over HTTP and upgrade+maintain a cache when the HSTS header is present. If ECH comes with a preload list, then browsers connecting to ECH domains will simply fail to connect rather than permit the network to downgrade their connection to non-ECH TLS.