Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SNI encryption #1

Closed
martinthomson opened this issue Apr 17, 2014 · 4 comments
Closed

SNI encryption #1

martinthomson opened this issue Apr 17, 2014 · 4 comments
Labels

Comments

@martinthomson
Copy link
Contributor

Server Name Indication could be encrypted to protect it from being inspected by passive attackers. There are some virtual-hosting type situations where hiding this information is considered desirable. If we can encrypt SNI, then it is probably trivial to encrypt other extensions.

However, this complicates the handshake. A lot. It also complicates virtual-hosting scenarios. Rich summarizes the issues pretty well here: http://www.ietf.org/mail-archive/web/tls/current/msg11823.html

ekr pushed a commit that referenced this issue Sep 23, 2015
ekr pushed a commit that referenced this issue Mar 20, 2016
ekr added a commit that referenced this issue May 20, 2016
@ekr ekr added parked and removed discuss-seattle labels Jul 8, 2016
ekr pushed a commit that referenced this issue Aug 13, 2016
@leonklingele
Copy link
Contributor

Is this already ruled-out? How could the SNI be encrypted without an addition RTT?

One could hash the SNI in the Client Hello which would at least help if the served host name is not publicly known (e.g. using a self-signed certificate).

@kaduk
Copy link
Contributor

kaduk commented Mar 3, 2017

It seems likely that there will eventually be an (optional?) extension that permits an encrypted "real" SNI, with some fake public SNI. But maybe that is not what you are asking.

@leonklingele
Copy link
Contributor

@ekr why was this closed?

@ekr
Copy link
Contributor

ekr commented Apr 17, 2017

Because we are not going to do anything about it in the base specification.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants