Discussion:
[squid-users] Is this the next step of SSL encryption? Fwd: Encrypted SNI
Eliezer Croitoru
2018-10-19 05:56:15 UTC
Permalink
I have seen this post and I was wondering, is this the next step of SSL
encryption?

Eliezer

-------- Original Message --------
Subject: Fwd: Encrypted SNI
Date: 2018-10-03 20:40
From: Владислав Толмачев <***@gmail.com>
To: ***@nginx.org
Reply-To: ***@nginx.org

When nginx will emplemented Encrypted SNI support?
Cloudflare already do this,
https://www.cloudflare.com/ssl/encrypted-sni/
_______________________________________________
nginx mailing list
***@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
--
----
Eliezer Croitoru
Linux System Administrator
Mobile: +972-5-28704261
Email: ***@ngtech.co.il
Amish
2018-10-19 08:01:42 UTC
Permalink
Today Cloudflare added more information that Firefox has already added
the support for ESNI in Nightly.

https://blog.cloudflare.com/encrypt-that-sni-firefox-edition/

Looks like ssl_bump is going to break once ESNI and Encrypted DNS are
universal. (Ofcourse it may be few years away)

Probably only way out to detect the domain name would be by implementing
CONNECT proxy instead of transparent one.

I am happy with complete encryption all over but its going to be more
and more difficult to convince bosses!! :D

Regards,

Amish.
Post by Eliezer Croitoru
I have seen this post and I was wondering, is this the next step of
SSL encryption?
Eliezer
-------- Original Message --------
Subject: Fwd: Encrypted SNI
Date: 2018-10-03 20:40
When nginx will emplemented Encrypted SNI support?
Cloudflare already do this,
https://www.cloudflare.com/ssl/encrypted-sni/
_______________________________________________
nginx mailing list
http://mailman.nginx.org/mailman/listinfo/nginx
Alex Rousskov
2018-10-19 15:51:50 UTC
Permalink
Post by Amish
Looks like ssl_bump is going to break once ESNI and Encrypted DNS are
universal. (Ofcourse it may be few years away)
Probably only way out to detect the domain name would be by implementing
CONNECT proxy instead of transparent one.
Using forward proxies may not help as much: A CONNECT request that uses
an IP address (instead of a domain name) is pretty much as uninformative
as a TCP connection intercepted by a transparent proxy.

Alex.
Matus UHLAR - fantomas
2018-10-19 16:47:17 UTC
Permalink
Post by Alex Rousskov
Post by Amish
Looks like ssl_bump is going to break once ESNI and Encrypted DNS are
universal. (Ofcourse it may be few years away)
Probably only way out to detect the domain name would be by implementing
CONNECT proxy instead of transparent one.
Using forward proxies may not help as much: A CONNECT request that uses
an IP address (instead of a domain name) is pretty much as uninformative
as a TCP connection intercepted by a transparent proxy.
disabling DNS in the internal network could help that a bit. That way
browser will have to use the proxy to resolve hostnames, so they will be
available to the proxy.

There are networks separated from the internet, where even the DNS may not
be available, so browsers can't rely on DNS being available.
--
Matus UHLAR - fantomas, ***@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Despite the cost of living, have you noticed how popular it remains?
Alex Rousskov
2018-10-19 17:09:07 UTC
Permalink
Post by Matus UHLAR - fantomas
Post by Alex Rousskov
Post by Amish
Looks like ssl_bump is going to break once ESNI and Encrypted DNS are
universal. (Ofcourse it may be few years away)
Probably only way out to detect the domain name would be by implementing
CONNECT proxy instead of transparent one.
Using forward proxies may not help as much: A CONNECT request that uses
an IP address (instead of a domain name) is pretty much as uninformative
as a TCP connection intercepted by a transparent proxy.
disabling DNS in the internal network could help that a bit.
... until the browser starts using DNS over HTTPS (with a pinned
certificate of the "resolving" HTTPS server)?
Alex.
Marcus Kool
2018-10-19 17:19:09 UTC
Permalink
Post by Alex Rousskov
Post by Matus UHLAR - fantomas
Post by Alex Rousskov
Post by Amish
Looks like ssl_bump is going to break once ESNI and Encrypted DNS are
universal. (Ofcourse it may be few years away)
Probably only way out to detect the domain name would be by implementing
CONNECT proxy instead of transparent one.
Using forward proxies may not help as much: A CONNECT request that uses
an IP address (instead of a domain name) is pretty much as uninformative
as a TCP connection intercepted by a transparent proxy.
disabling DNS in the internal network could help that a bit.
... until the browser starts using DNS over HTTPS (with a pinned
certificate of the "resolving" HTTPS server)?
Alex.
It is relatively easy to block DNS over HTTPS and I think there will be demand for that.
And I predict that Squid will have a feature to selectively block connections with ESNI to force clients to use the plain text SNI.

Marcus
Alex Crow
2018-10-19 19:28:46 UTC
Permalink
Post by Marcus Kool
Post by Alex Rousskov
... until the browser starts using DNS over HTTPS (with a pinned
certificate of the "resolving" HTTPS server)?
  Alex.
It is relatively easy to block DNS over HTTPS and I think there will be demand for that.
And I predict that Squid will have a feature to selectively block
connections with ESNI to force clients to use the plain text SNI.
Marcus
I can still see the endpoint security companies will be raking it in.
Any of those fallbacks could be disabled by the browsers.

We're going to have to make sure that the endpoint solution is able to
see all content before it is rendered or interpreted in the browser too.

The problem is that the whole SSL/TLS trust management system is
fundamentally broken and I can't see that changing soon. PGP's model was
great in theory (web of trust) but most people simply don't care who
sends them what and can't be bothered to complicate their lives any
more. And why should they? If their bank site works, Farcebook works and
Hotmail works, why worry? We've built an entire social structure on two
basic principles - "if I've done nothing wrong..." and "who'd be
interested in my data?".



--
This message is intended only for the addressee and may contain
confidential information. Unless you are that person, you may not
disclose its contents or use it in any way and are requested to delete
the message along with any attachments and notify us immediately.
This email is not intended to, nor should it be taken to, constitute advice.
The information provided is correct to our knowledge & belief and must not
be used as a substitute for obtaining tax, regulatory, investment, legal or
any other appropriate advice.

"Transact" is operated by Integrated Financial Arrangements Ltd.
29 Clement's Lane, London EC4N 7AE. Tel: (020) 7608 4900 Fax: (020) 7608 5300.
(Registered office: as above; Registered in England and Wales under
number: 3727592). Authorised and regulated by the Financial Conduct
Authority (entered on the Financial Services Register; no. 190856).
Troiano Alessio
2018-10-20 06:00:13 UTC
Permalink
Sorry but, I'm loosing something...
Also if client will use ESNI, the server should response with a certificate that will be in clear and has all server information, like alias... So is it possible to know what is the resource the client is looking for. Only with wildcard certificate you can't.

Il presente messaggio e-mail e ogni suo allegato devono intendersi indirizzati esclusivamente al destinatario indicato e considerarsi dal contenuto strettamente riservato e confidenziale. Se non siete l'effettivo destinatario o avete ricevuto il messaggio e-mail per errore, siete pregati di avvertire immediatamente il mittente e di cancellare il suddetto messaggio e ogni suo allegato dal vostro sistema informatico. Qualsiasi utilizzo, diffusione, copia o archiviazione del presente messaggio da parte di chi non ne è il destinatario è strettamente proibito e può dar luogo a responsabilità di carattere civile e penale punibili ai sensi di legge.
Questa e-mail ha valore legale solo se firmata digitalmente ai sensi della normativa vigente.

The contents of this email message and any attachments are intended solely for the addressee(s) and contain confidential and/or privileged information.
If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately notify the sender and then delete this message and any attachments from your system. If you are not the intended recipient, you are hereby notified that any use, dissemination, copying, or storage of this message or its attachments is strictly prohibited. Unauthorized disclosure and/or use of information contained in this email message may result in civil and criminal liability. “
This e-mail has legal value according to the applicable laws only if it is digitally signed by the sender
Alex Rousskov
2018-10-20 21:57:11 UTC
Permalink
Post by Troiano Alessio
Also if client will use ESNI, the server should response with a certificate that will be in clear
Starting with TLS v1.3, the server certificate is encrypted.

Alex.
Eliezer Croitoru
2018-10-20 22:25:38 UTC
Permalink
I believe that eventually some of these features would be targeted by
the overall security community.
Security from one hand has encryption as a tool but it was already
proven that obscurity is not really security.
In fact until now from what I know many of the more sane clients in the
private and the public sector prefer to be able to cope with specific
issues directly and not hide them.
Like in the hardware world complex functions were embedded into
different types of CPU's or PU's and the large sector wants and needs
it,
the Internet clients and users already understands that they want to be
able to have some control either by a proxy service provider or by other
means.
Just the other day I entered a "secured" site which is under the trust
of a well know RootCA and what I got was a bunch of pop ups with exactly
the things I want and need ie:
- Women underwear (with a demo how the body looks with and without the
underwear) Whaaaat? yes I do not have an issue with that but Whaaat? I'm
a man I need a working man shirts for work..
- The best Porn addiction solution. I am most of the day work with CLI
or a text editor or System administration utilities.
- How to operate a specific software which I have never heard about.
....

It's nice to have some laugh while working but my co-worker (a women)
didn't liked the idea and I agree with her.

And nothing less then that, CloudFlare was hosting or proxying to these
sites acting as a frontend.


Thanks All,
Eliezer
Post by Alex Rousskov
Post by Troiano Alessio
Also if client will use ESNI, the server should response with a
certificate that will be in clear
Starting with TLS v1.3, the server certificate is encrypted.
Alex.
_______________________________________________
squid-users mailing list
http://lists.squid-cache.org/listinfo/squid-users
--
----
Eliezer Croitoru
Linux System Administrator
Mobile: +972-5-28704261
Email: ***@ngtech.co.il
Loading...