Skip to content

Commit 88438b4

Browse files
committed
Merge branch 'main' into publish
2 parents efa7240 + cce748a commit 88438b4

File tree

5 files changed

+36
-10
lines changed

5 files changed

+36
-10
lines changed

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22

33
Security analysis of the defo2 project + HOWTO for web admins
44

5+
Rendered version: https://certtools.github.io/defo-security-analysis/
6+
57
## Deliverable text
68

79
Deployment Scenarios Analysis: there are many variations in how ECH can be deployed and the varying relationships between the client and server entities involved. There therefore remains a need to map out residual privacy leaks in such scenarios and how to plug those, given the existence of additional privacy mechanisms such as Qname Minimization, Oblivious DNS-over-HTTPS, and MASQUE.

questions.txt

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,29 @@ I already purchased all China could offer me. However, I have a wicked new plan:
4242

4343
win.
4444

45+
# General questions
46+
47+
ZF <-> CFS / Backend: publishing lots of updated zone files generates lots of notifies in DNS. Are we sure we want this?
48+
49+
50+
Split mode:
51+
* what happens in the situation where I use a CDN for DDOS protection but keep my DNS zones myself?
52+
53+
Idee:
54+
indirection point in the PTR record rein geben, dann ein forward lookup machen, dann kommt an an den key, der fuer den Split-Mode relevant ist.
55+
Ist das nicht besser als SVCB?
56+
57+
Don't we get more metadata because of DoH heartbeat?
58+
59+
The bigger ones win... that's a PROBLEM.
60+
They have more data, this allows them to correlate.
61+
62+
Why does Tor not use DoH? Because of centralization in DoH.
63+
Centralization leads to no need for registry anymore.
64+
65+
How about the following: make a certificate for the IP address of the server and then use that for bootstrapping the ESNI
66+
67+
If the encryption has a known plaintext attack , then we could precompute ... Probably not feasible....
4568

4669

4770

report/deployment/overview.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,22 @@ This section addresses ECH deployment considerations. Where relevant, it will li
44

55
## Process overview
66

7-
![WKECH flow](wkech-flow.png)
8-
9-
### Client process
7+
This is a simplified overview of the workflow involved in the browser opening an ECH-protected website.
108

11-
I. To request a website, the browser first queries the A/AAAA record and the ECHConfig from the configured DoH/DoT server. The DoH/DoT server is either provided by the network owner or by a large CDN.
129

13-
II. The DoH server queries the information at the autoritative DNS server via DNS, managed by the website operator.
14-
15-
II. The information is sent from the DNS server to the DoH server and potentially cached.
10+
![WKECH flow](wkech-flow.png)
1611

17-
IV. The information is passed on to the client
12+
### Client process
1813

19-
V. Using the A/AAAA record and the ECHConfig, the browser requests the website from the web server
14+
<ol>
15+
<li style="list-style: upper-roman;">To request a website, the browser first queries the A/AAAA record and the ECHConfig from the configured DoH/DoT server. The DoH/DoT server is either provided by the network owner or by a large CDN.</li>
16+
<li style="list-style: upper-roman;">The DoH server queries the information at the autoritative DNS server via DNS, managed by the website operator.</li>
17+
<li style="list-style: upper-roman;">The information is sent from the DNS server to the DoH server and potentially cached.</li>
18+
<li style="list-style: upper-roman;">The information is passed on to the client</li>
19+
<li style="list-style: upper-roman;">Using the A/AAAA record and the ECHConfig, the browser requests the website from the web server</li>
20+
</ol>
2021

21-
FIXME: do the DoH servers fetch their data via DNS or DoH? Protocol Upgrades?
22+
The DoH servers query the autoritative DNS servers mostly via traditional unencrypted UDP-based DNS (Do53), however DoT and DoH are increasingly adopted in this area too. Protocol upgrades (opportunistic or via SVCB records) are also used.
2223

2324
### Server process
2425

stammtisch/presentation.odp

-573 Bytes
Binary file not shown.

stammtisch/presentation.pdf

377 KB
Binary file not shown.

0 commit comments

Comments
 (0)