| ▲ | deep1283 7 hours ago | ||||||||||||||||
ECH is great from a privacy perspective, but I’m curious how well this will actually work in practice.every time the web encrypts more metadata there’s pushback from middleboxes and network operators. | |||||||||||||||||
| ▲ | tialaramex 2 hours ago | parent | next [-] | ||||||||||||||||
> I’m curious how well this will actually work in practice You're experiencing it working in practice. RFC9849 is a published document, the end of a very long process in which the people who make this "actually work in practice" decided how to do this years ago and have deployed it. This isn't like treaty negotiation where the formal document often creates a new reality, the RFC publication is more like the way the typical modern marriage ceremony is just formalising an existing reality. Like yeah, yesterday Bill and Sarah were legally not married, and today Bill and Sarah are married, but "Bill and Sarah" were a thing five Christmases ago, one of the bridesmaids is their daughter, we're just doing some paperwork and having a party. | |||||||||||||||||
| ▲ | boondongle 7 hours ago | parent | prev | next [-] | ||||||||||||||||
The tension is that Security and Dev parts of the stack remove the actual troubleshooting capabilities of the Network layer without opening up the tools that are supposed to replace them. It's not a problem if Network can still do their job. It's a whole other matter to expect Network to do their job through another layer. You end up with organizations that can't maintain their applications and expect magic fixes. Orgs that are cooperative probably don't have this issue but there are definitely parts of some organizations that when one part takes capability from another they don't give it back in some sort of weird headcount game despite not really wanting to understand Network to a Network level. | |||||||||||||||||
| |||||||||||||||||
| ▲ | hypeatei 4 hours ago | parent | prev [-] | ||||||||||||||||
ECH won't be effective until there's a HSTS-style policy that forces browsers to use it. Otherwise, firewalls will continue to strip parameters and downgrade connections[0]. 0: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Ho... | |||||||||||||||||
| |||||||||||||||||