Skip to content

Commit f2ec5c5

Browse files
authored
Merge pull request #6 from certtools/main
merge
2 parents 910db39 + 058b259 commit f2ec5c5

File tree

11 files changed

+170
-72
lines changed

11 files changed

+170
-72
lines changed

mkdocs.yml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,10 @@ nav:
3131
- References: references.md
3232

3333

34-
theme: readthedocs
35-
36-
37-
34+
theme: material
35+
plugins:
36+
- to-pdf:
37+
author: L. Aaron Kaplan, Sebastian Wagner
38+
cover_title: Remaining weaknesses in ECH
39+
cover_subtitle: TODO
40+
output_path: build/document.pdf

report/attacks/correlations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
# Correlations on traffic patterns
22

3-
Various existing research on this
3+
There is extensive research on this topic. Traffic corrections do not depend on unencrypted SNI, so ECH will not have any effect on this.
44

5-
"Encrypted (Network) Traffic Classification"
5+
We refer to existing materials on the subject of "Encrypted (Network) Traffic Classification".
6+
Examples include:
67

78
* <https://www.sciencedirect.com/science/article/pii/S2090447923002502>
89
* <https://ieeexplore.ieee.org/document/8622812>
910
* <https://www.mdpi.com/2073-8994/13/6/1080>
1011

11-
Does *not* depend on unencrypted SNI!

report/attacks/legal.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# By Legal Means
2+
3+
As discussed in the section [Censorship](../censorship.md), some countries, such as Russia, already use legal measures to enforce censorship.
4+
Others are expected to adopt similar practices in the near future.
5+
ECH is unable to influence or bypass these restrictions.

report/attacks/metadata.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,22 @@
1-
## Explicit metadata
21

3-
What is left in the protocols?
2+
# De-anonymization by Metadata
3+
## Explicit: ECH usage
44

5-
## Implicit metadata
5+
The ECH standard appears to be well designed minimizing metadata.
66

7-
### CRL
7+
Only the usage of ECH itself is left as a suspicious marker, drawing the attention of censors to possibly interesting traffic. See [Censorship](../censorship.md) for more information.
88

9-
http usage
9+
## Implicit: DNS queries
10+
11+
As the [Deployment Overview](../deployment/overview.md) outlines, clients request the ECH configuration via DNS during the initial setup and for subsequent refreshes.
12+
Since the recommended lifespan for the keys is one hour, clients must update their ECH keys at least once every hour.
13+
14+
Browsers utilize the same DNS-over-HTTPS (DoH) server across all installations, which presents several risks:
15+
16+
- Single point of failure
17+
- Single point of truth
18+
- Central point for de-anonymization attacks
19+
20+
These risks can be mitigated by using decentralized DoT, as with Do53, instead of central DoH servers.
21+
22+
Further, the WKECH standard could be used by browsers for key refreshment, reducing the metadata at DNS server operators.

report/censorship.md

Lines changed: 49 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,56 @@
11
# Censorship
22

3-
## RU
3+
This section provides an overview of the regions currently use SNI for censorship purposes, those blocking ECH usage, and countries that may soon implement similar measures.
44

5-
* Russia disallowing CDNs in order to block ECH: <https://github.com/net4people/bbs/issues/417>
6-
* <https://therecord.media/russia-blocks-thousands-of-websites-that-use-cloudflare-service>
5+
For a comprehensive analysis of internet censorship practices around the globe, see [A Survey of Worldwide Censorship Techniques](https://www.ietf.org/archive/id/draft-irtf-pearg-censorship-10.html).
76

8-
## CN
7+
## Russia
98

10-
- Not blocking ECH currently
11-
- Do they need to block ECH at all?
12-
- Do they control the clients?
13-
- Do they need to block anything because they have other means (Social Credits)?
9+
Russia is know to block ECH traffic:
1410

15-
## KR
11+
- <https://github.com/net4people/bbs/issues/417>
12+
- <https://therecord.media/russia-blocks-thousands-of-websites-that-use-cloudflare-service>
1613

17-
- Blocking by SNI:
18-
- <https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/>
19-
- <https://www.technadu.com/south-korea-extend-site-blocking-snooping-sni/58125/>
20-
- Workaround: VPNs and ESNI
21-
- ESNI was removed from browses, ECH follows but harder to adopt
14+
The government uses SNI information as a method for implementing censorship measures. Furthermore, foreign content delivery networks (CDNs) are prohibited, enforces the use of domestic service providers. This keeps the control over data transmission and access national.
15+
16+
## China
17+
18+
The Great Firewall (GFW) of China is one of the most extensive censorship implementation in the world and reports indicate that China is blocking ESNI and ECH.
19+
20+
The GFW utilizes SNI alongside other technologies enforce content blocking.
21+
22+
Sources:
23+
24+
- <https://gfw.report/blog/gfw_esni_blocking/en/>
25+
- <https://github.com/net4people/bbs/issues/43>
26+
27+
## South Korea
28+
29+
South Korea uses SNI to restrict access to specific online resources.
30+
31+
While people in South Korea could previously used ESNI as a workaround to bypass these restrictions, browser updates have removed support for ESNI, complicating efforts to maintain online privacy.
32+
33+
As laid out in [Incenctives](deployment/incentives.md), the affected industries have also commercial interest in using ECH.
34+
35+
It is yet unclear how South Korea's authorities will react to ECH.
36+
37+
- <https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/>
38+
39+
- <https://www.technadu.com/south-korea-extend-site-blocking-snooping-sni/58125/>
40+
41+
## Kazakhstan
42+
43+
Kazakhstan uses a national Certificate Authority (CA) to intercept and decrypt TLS traffic.
44+
In this case, ECH offers no benefit at all, as the central decyption of all traffic serves all counter-measures ineffective.
45+
46+
Sources:
47+
48+
- <https://censoredplanet.org/kazakhstan>
49+
50+
## Others
51+
52+
Several countries use unencrypted SNI for filtering and blocking websites, including:
53+
54+
Cuba, Egypt, India, Iran, Saudi Arabia, Syria, Turkey, Turkmenistan, United Arab Emirates, Vietnam
55+
56+
Once ECH plays a relevant role, we expect that these countries block ESNI/ECH to ensure the effectiveness of their measures.

report/clients/browsers.md

Lines changed: 28 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,39 +1,43 @@
1-
# Browsers
1+
# Browsers and ECH
22

3-
browsers are permissive
4-
if dns is misconfigured, browser tries without ECH
3+
Modern web browsers are notably permissive toward emerging standards, often prioritizing user functionality over enforcing new security features if the potential impact is too disruptive. With their quick adoption of new technologies and fast release cycles, they effectively serve as experimental platforms for evaluating and implementing new protocols in real-world environments.
54

6-
explore how FF and other browsers behave with famility safety software exactly, so far not tested
5+
The leading browsers Firefox, Chrome, Edge and further Brave, Opera, Vivaldi adopted DoH as their default setting, reverting back to Do53 should a DoH connection fail to establish. Such failures can arise from active downgrade attacks, where malicious entities intercept and manipulate traffic. Consequently, the implementation of ECH can be thwarted if an attacker holds sway over any part of the network path between the user and the intended target.
76

8-
## Non-pure-HTTPS traffic
7+
For the implementation of ECH, attention must not only be paid to pure HTTPS traffic but also to other communication channels such as WebRTC and network proxies, as neglecting ECH on these channels can introduce ways for de-anonymization.
98

10-
### Jitsi
9+
## Browsers' Policy Enforcement Power
1110

12-
- UDP/10000 Jitsi video bridge
13-
- UDP/3478 STUN server (coturn)
14-
- TCP/5349 fall-back connection for video/audio communication (in case the UDP connection did not work)
15-
- TCP/443 (HTTPS) only for the UI, protected with ECH by default
11+
In the past, Browsers and the CA/Browser forum have repeatedly shown that they can enforce new policies towards network and website operators, pushing them to fast adjustments to not risk their website's reputations, such as:
1612

17-
### Network Proxy
13+
- Starting in 2015, Browsers gradually marked unencrypted HTTP connections as unsafe, pushing all website operators to use HTTPS.
14+
- Previous to 2011, certificate lifetimes of up to 10 years were allowed by standards and accepted by browsers. Since 2020, a year is the maximum allowed lifetime. Discussions on further reductions are ongoing.
15+
- Other examples include: Deprecation of SHA-1 (2014-2017) and Deprecation of RSA Keys (since 2010), Distrust of CAs (Symantec, 2017–2018), Mixed Content Blocking, [Requirements to CAs](https://cabforum.org/baseline-requirements/) such as Certificate Transparency, OCSP, `SubjectAltName`, Domain Validation Methods, Deprecation of Certificates for Internal Server Names (2011-2016), Deprecation of TLS protocols and cipher suites
1816

19-
SOCKS, HTTPS
17+
The reasons for this effectiveness lie in the huge market share of a small number of browsers and, on the operators' side, the high reputation risk: Website operators simply cannot afford security warnings or site breakage.
2018

21-
### OCSP and CRL
19+
These policies are increasingly getting tighter, pushing the operators to more automation and more complex environments. This, in turn makes the operation less efficient pushing many of them to centralized service operators. This counteracts the original intention of a decentralized Internet.
2220

23-
Downloaded via HTTP but signed by the CA
24-
Blocking the access to the lists is possible with packet inspection due to the traffic being unencrypted
25-
Browser soft-fail by default
26-
OCSP is dead: <https://letsencrypt.org/2022/09/07/new-life-for-crls/>
27-
Work ongoing to fix these issues
21+
**Therefore, we emphasize that the CA/Browser forum must not use its power to enforce ECH** because it pushes users to DoH.
2822

29-
### QUIC and SPDY
23+
## DoH server oligarchy
3024

31-
should work
25+
Firefox and Edge use Coudflare's DoH server, and Chrome uses Google's DoH server.
26+
Just two DoH servers provide DoH services to the majority of browser users.
27+
This imbalance implies various problem areas:
3228

33-
## Firefox
29+
- Privacy: Despite their emphasis that they won't save the query data, these policies can change at any time. Users are locked into a trust dependency without opt-in.
30+
- Jurisdiction and Geopolitics: The DoH servers are operated by companies in a single country. Their legal system can force them to share the query data at any time, impacting users **worldwide** without any possibility for them to notice.
31+
- Market dominance: Just two operators control the majority of all DoH traffic. This creates a huge market dominance. In the future, this can lead to them effectively taking over the role of Domain registrars.
3432

35-
timing issue FF: no new information
33+
As DoH is required for ECH, these problems are worsened by ECH.
34+
ECH aims to defend users' privacy, but its dependency on DoH thwarts this goal.
3635

37-
### Deliberately disabled
36+
## OCSP and CRL
3837

39-
The Interop report mentions that ECH is disabled deliberately when local interception software is detected, and also with ISP- or state-level censorship
38+
Online Certificate Status Protocol (OCSP) and Certificate Revocation Lists (CRL) are core components in the validation of digital WebPKI certificates. The data is typically transmitted over HTTP but verified through signing by the Certificate Authority (CA).
39+
Access to these lists can be obstructed through packet inspection due to the unencrypted nature of the traffic. Browsers generally employ a soft-fail approach for CRL validations by default, meaning the information about a revoked certificate may not reach the client. If an adversary has the capability to interfere at this stage, they may effectively disrupt other, more important connections as well.
40+
41+
OCSP has recently been called into question and may be nearing obsolescence: <https://letsencrypt.org/2022/09/07/new-life-for-crls/>. As a result, the CRLs' importance increases again.
42+
43+
This study found no relevant interplay of ECH on CRL and OCSP mechanisms.

report/clients/iot_and_libs.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
# Libraries and Devices in the Internet of Things
2+
3+
## Internet of Things
4+
5+
The Internet of Things (IoT) is formed of a vast range of device types that typically have a significantly longer lifecycle compared to traditional internet-connected devices like clients and servers. Their applications can range from huge medical imaging tools to tiny gadgets. The extended lifespan and - in many cases - great certification efforts lead to variable software update cycles. When a vulnerability is identified within the software stack, the challenge of rolling out the necessary updates becomes substantially more complex.
6+
7+
Moreover, numerous IoT devices lack automatic update capabilities at all, and in some instances, these updates are not feasible at all. The underlying software quality often suffers as well, driven by constraints related to financial resources and the sheer scale of development. Paradoxically, due to the critical nature of maintaining device security amid the difficulties associated with updates, the quality of the software must actually be higher to mitigate these risks effectively beforehand.
8+
9+
## Libraries and Packagin
10+
11+
TLS libraries that are often package by other software of provided by [package management systems](https://en.wikipedia.org/wiki/Package_manager).
12+
They might also face a similar challenge as IoT devices, but to a much smaller extent.
13+
Operating system providers for are keen on stability, new features are often released in batches as major/minor releases. For server systems these span can in practice be five years or more.
14+
The percentage of early adopters will likely be very small, and only viable for those with strong incentives.
15+
16+
## Command Line Tools
17+
18+
Often settings for TLS configuration can only be enabled by less known obscure command-line flags.
19+
Therefore, good default values for ECH are crucial.
20+
21+
Otherwise, they can impose a side-channel leaking domain names leading to de-anonymization.

report/clients/tor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
# TOR Network
22

33
Currently, Encrypted ClientHello (ECH) is not supported on the TOR network, primarily because the Firefox foundation mandates the use of DNS over HTTPS (DoH) for ECH functionality, while TOR disables DoH in order to uphold user privacy.
4-
TOR’s architecture is designed to enhance security and privacy, which mitigates the necessity for the additional layers that DoH and ECH provide. By operating through a decentralized network of volunteer-run relays, TOR ensures that user data remains obscured from potential surveillance.
5-
Contrary to Do53 and DoH, TOR employs an alternative approach, utilizing DNS over the TOR network and subsequently through the exit node.
6-
TOR inherently addresses the concerns that both DoH and ECH aim to resolve, particularly through its TOR onion services.
4+
TOR’s architecture is designed to enhance security and privacy, which mitigates the necessity for the additional layers that DoH and ECH provide. For more information how TOR protects their users' privacy, please refer to the [TOR website](https://support.torproject.org/censorship/).
5+
Contrary to DoT and DoH, TOR employs an alternative approach, utilizing DNS over the TOR network and subsequently through the exit node.
6+
TOR addresses the concerns that both DoH and ECH aim to resolve, through its TOR onion services.
77

88
- Detailed explanation on TOR's non-usage of DoH can be found here: <https://lists.torproject.org/mailman3/hyperkitty/list/[email protected]/thread/6GDO7CYEFIKID7QQCRVYVFNIVETWWWWY/#6ZBFGNSRPWRCEO7PVPSHHVLAOGF7KN3C>
99
- Discussion on DNS over HTTPS (DoH) in TOR: <https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/30753>

0 commit comments

Comments
 (0)