-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider SVCB-Used header #107
Comments
Why does the server need this information when it already knows the IP the client connected to? |
It would be preferable to not have to burn IPv4 for this, plus this channel would only ever be sent encrypted in HTTPS requests whereas other options (different IPs, information in echconfig such as the public SNI or keyid) are all much worse in-terms of leaking information to passive network observers. Is there a version of this that browsers/clients would be willing to implement? (ie, 1 bit? 4 bits? 8 bits? the SvcDomainName? an arbitrary string to avoid a privacy-theatre perspective?) |
Fixes #107 May want working group discussion in dnsop and/or httpbis
Proposed to defer this to a future draft (and perhaps as part of an alt-svc-bis). |
If decoupling from Alt-Svc, having an alternative to Alt-Used would be valuable. This should take lessons from challenges with Alt-Used adoption and should minimize the privacy impact.
Some options include:
I'm leaning towards (3) above as this bounds the amount of additional entropy to be significantly less than what could be done already by using an alternate port number or IP(v4/v6) address but still allows some level of signalling without requiring servers to have to go through the complexity of needing to use distinct ports/IPs (or ESNI key IDs), all of which are possible but which leak more to passive adversaries.
The text was updated successfully, but these errors were encountered: