<?xml version="1.0" encoding="utf-8"?>

<?xml-model href="rfc7991bis.rnc"?>

<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  docName="draft-stein-tls-ech-considered-harmful-00"
  ipr="trust200902"
  category="info" 
  submissionType="IETF"
  xml:lang="en"
  version="3">

  <front>
    <title abbrev="ECH Considered Harmful">ECH Considered Harmful</title>
    
    <seriesInfo name="Internet-Draft" value="draft-stein-tls-ech-considered-harmful-00"/>
   
    <author fullname="Yaakov (J) Stein" initials="Y(J)" surname="Stein">
      <organization>Allot</organization>
      <address>
        <postal>
          <street>22 Hanagar St.</street>
          <city>Hod Hasharon</city>
          <code>45240</code>
          <country>IL</country>
        </postal>        
        <email>ystein@allot.com</email>  
        <uri>www.allot.com</uri>
      </address>
    </author>
   
    <date year="2025"/>

    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>ECH, privacy, security</keyword>

    <abstract>
      <t>Encrypted Client Hello is designed to enhance personal privacy, 
		 in particular obstructing the ability of communications service providers
		 (but not Over The Top service providers) to map packet flows to applications.
		 While mostly ineffective in attaining this goal, 
         it does severely hamper network-based detection of malicious flows,
         thus exposing end-users to various security risks that were previously avoidable. </t>
    </abstract>
 
  </front>

  <middle>
    
    <section>
      <name>Introduction</name>
      <t>Transport Level Security (TLS) 1.3 <xref target="RFC8446"/> 
	     secures communications between clients and servers,
         providing integrity, confidentiality and server authentication. 
		 However, certain cleartext extensions in the TLS Client Hello (CH) message
		 actually facilitate application identification by third parties.
		 This capability may be abused for pervasive monitoring <xref target="RFC7258"/>. </t>		 
		 
	  <t>Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> has been proposed 
		 to remedy the perceived privacy infringement inherent in the TLS CH,
         in order to alleviate its pervasive monitoring aspects.
         However, RFC7258 recognizes that there are forms of monitoring  
		 that can be beneficial and not part of any attack, e.g.,
         network management functions and malicious packet detection. </t>

      <t>In this memo we explore precisely these two issues.
	     While we support efforts to protect personal privacy and mitigate pervasive monitoring attacks,
	     we will show that ECH is misguided in its rationale, 
	     largely ineffective in attaining its aims, 
		 and is harmful due to exposing clients to avoidable security risks. </t>
		 
    </section>
    
    <section>
      <name>ECH is misguided</name>
	  <t> The rationale behind ECH is the hiding of a client's behavior, 
          and in particular which servers a given client accesses, 
	      from the prying eyes of surveillance.
		  However, the mechanism only impacts surveillance along the path
		  between client and server; it obviously does not thwart information gathering
		  by the Over The Top (OTT) entity operating the server itself. </t>
		  
	  <t> OTT service providers routinely collect personal information
          of clients accessing their servers.
          In fact, their business model is based on knowing their clients    
          better than these clients know themselves.
          Client personal information is packaged and monetized, 
		  and was indeed the main source of personal information 
		  exploited by governmental agencies.
          ECH plugs a pin-hole leak in an open-ended pipe. </t> 	  
		  
	  <t> On the other hand, Internet Service Providers (ISPs) 
	      need to identify the applications to which their client's packet flows belong
		  in order to economically guarantee a level of Quality of Experience (QoE).
          ISPs may be under contractual obligation to deliver some minimal QoE,
          and even if this level is not explicitly specified,
		  underperformance will lead to unsatisfied clients and subsequent churn.
          Throwing additional bandwidth at this problem does not always ameliorate the problem,
          and even when it does that entails a price. </t>
		  
	  <t> Many ISPs use smart traffic management based on application classification
	      in order to optimally forward each packet - prioritizing packets requiring
		  expedited delivery, delaying time insensitive packets, 
		  and under conditions of extreme congestion discarding packets belonging to 
		  rate-adaptive applications. 
		  Furthermore, ISPs may provide network-based security services that block malicious traffic.
          These use-cases require identifying the application but not the client, 
		  and thus do not involve personal information from a particular client. </t>

       <t>Some use-cases do require identifying clients. Specific clients 
	      may have specific policies regarding applications or application classes; 
		  for example, first responders will generally be given priority over other clients.
		  Another case is identifying and disconnecting clients belonging to botnets. </t>
		  
	  <t> Unlike OTTs, even in these cases ISPs do not monetize client personal information, 
          and thus have little incentive to collect and store flow-to-application mappings. 
		  Thus, ECH penalizes ISPs that need application classification
		  in order to economically deliver the promised service level to their clients,
          and to protect these clients from infection with malware.		  
		  At the same time OTTs continue to exploit much more intrusive collection 
		  of personal information. </t>
		  
	  <t> It may be claimed that other actors 
	      (e.g., law enforcement, intelligence agencies, organized crime) 
		  may gain access to ISP client application information.
          That is true. But why coerce an ISP to hand over relatively lean
          and unorganized information when it is much easier and more rewarding
		  to get this information from the OTTs or from client device(s)? </t>

      <t> Mechanisms have been proposed to deliver application flow requirements
	      to ISP network elements, such as explicit path signals <xref target="RFC8558"/>.
          On-path signaling of application requirements from client applications
          to ISP routers and middleboxes could obviate the need for application identification.	
          However, no such signaling protocol exists, and were it to exist the 
		  economic motivation to implement is unclear (except for malicious actors),
          and use of such a protocol itself could equally be considered pervasive monitoring.  </t>		  

    </section>   

    <section>
      <name>ECH is not effective</name>
      <t>Deploying ECH is intended to deny ISPs the ability to map a packet flow to the application
	     it serves. It fails in this in two distinct ways.</t>

      <t>First, it is not difficult for an ISP to block ECH and force its client to send CH in the clear.
	     Most clients are configured to employ DNS resolvers belonging to their ISP,  
		 thus assuring authoritative behavior for CDNs and enabling load balancing.
		 In this case the ISP can simply decide not to distribute the ECH key in HTTPS RR responses,
		 thus inhibiting the use of ECH.
		 Even when the DNS resolver is not under direct control of the ISP,
		 it is not difficult to excise the ECH SvcParam from unencrypted DNS,
		 or even to completely discard HTTPS RR reponses,
		 choking ECH without the client ever noticing. </t>
		 
	  <t>Second, while Deep Packet Inspection (DPI) systems exploit fields in the CH when they are available, 
         granular classification is certainly not impossible without them.
		 By granular classification we mean not merely identifying the OTT (e.g., Google)
		 but differentiating between the different services it provides (e.g., search, maps, docs, Youtube, etc.).		 
		 In a recent experiment on a large mobile network, we trained a classifier on one week 
		 of flow metadata with no TLS CH information, limiting ourselves to under one second of traffic.
		 We then tested classification a week later, a month later, and several months later.
		 We found that after one week we can granularly classify applications and web sites
		 with over 90% F1 accuracy, approaching the accuracy of a DPI system that uses the TLS CH fields.
         Performance degraded by less than two percent per month, 
         meaning that monthly retraining suffices to maintain high accuracy.</t>		 

	  <t>While accuracy was not severely impacted, the computational power, 
	     and hence the electric energy required for classification, markedly increased
		 (and this without taking training computation into account).
         The increased computation influences the ISP's CAPEX and OPEX,
         in addition to being environmentally detrimental. </t>
	  
	</section>   

    <section>
      <name>ECH is harmful</name>
      <t>While about 95 percent of packet flows were correctly identified, 
         the long tail of extremely rare applications and web sites were classified as "other".
         These rare services either did not appear in the training data,
         or occurred insufficiently frequently to be reliably recognized.
         Unfortunately, it is precisely these unpopular sites that are most
         likely to be infected, either because their security is lax, or because they are
		 specifically created to serve malware (frequently with domain names deceptively similar 
		 to those of popular services). </t>
		 
	  <t>These small malicious sites are often cohosted on a single server IP address with
	     hundreds of mostly benign sites.
		 The inability to reliably distinguish between cohosted sites 
		 forces an ISP providing network-based security 
		 to either allow its clients to be attacked, 
		 or to block hundreds of completely legitimate sites.</t>
		 
	  <t>One might ask whether network-based security is the correct approach, 
	     rather than leaving responsibility for security to the end-user.
		 But why should the average Internet user be burdened with installation 
		 and constant upgrading of security solutions?
         People expect their water utility to supply safe water without having to install filters 
		 to remove dangerous substances! 
		 Similarly, they have the right to expect their ISP to supply them with safe Internet, 
		 without needing to install and maintain firewalls, antivirus software, 
		 and a plethora of other complex tools.</t>
	  
	  
	</section>   

    <section>
      <name>Summary</name>
	  
      <t>We have shown that ECH is misguided, mostly ineffective, and harmful.
         It heavy-handedly attempts to block application identification 
		 even when there is, in reality, no personal information involved, 
         and despite other entities actively exploiting this personal information.
		 It does not inhibit application identification, 
		 but merely renders it much more expensive  and environmentally detrimental.
		 In the security-vs.-privacy trade-off it comes down clumsily on the side of 
		 perceived privacy protection while trampling on security concerns.</t>
		 
	  <t>While many (if not most) people are willing to relinquish control over some of their privacy rights, 
		 e.g., in order to receive free service, privacy remains tremendously important.
         The IETF must strive to develop protocols that are not needlessly privacy invasive.
		 Security is another, no less important, goal.
		 The IETF must ensure that its protocols do not needlessly endanger Internet users.
         Were you to ask a typical Internet user whether they want 
         the behavioral anonymity supposedly provided by ECH,
		 but at the cost of risking loss of all their digital assets to ransomware, 
		 what do you think their answer would be?</t>
 	 
	</section> 
	
    <section anchor="IANA">
	  <name>IANA</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    
    <section anchor="Security">
	  <name>Security</name>
      <t>This document should not affect the security of the Internet.</t>
    </section>
    
  </middle>

  <back>
    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>
        
		<reference anchor="I-D.ietf-tls-esni" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni-25">
			<front>
				<title>TLS Encrypted Client Hello</title>
				<author initials="E." surname="Rescorla" fullname="Eric Rescorla">
					<organization>Independent</organization>
				</author>
				<author initials="K." surname="Oku" fullname="Kazuho Oku">
					<organization>Fastly</organization>
				</author>
				<author initials="N." surname="Sullivan" fullname="Nick Sullivan">
					<organization>Cryptography Consulting LLC</organization>
				</author>
				<author initials="C. A." surname="Wood" fullname="Christopher A. Wood">
					<organization>Cloudflare</organization>
				</author>
				<date month="June" day="14" year="2025"/>
			</front>
			<seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
		</reference>
		
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8558.xml"/>

		
      </references>
 
    </references>
    
 </back>
</rfc>