<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-svcb-ech-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="ECH in SVCB">Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-svcb-ech-05"/>
    <author initials="B." surname="Schwartz" fullname="Ben Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author initials="M." surname="Bishop" fullname="Mike Bishop">
      <organization>Akamai Technologies</organization>
      <address>
        <email>mbishop@evequefou.be</email>
      </address>
    </author>
    <author initials="E." surname="Nygren" fullname="Erik Nygren">
      <organization>Akamai Technologies</organization>
      <address>
        <email>erik+ietf@nygren.org</email>
      </address>
    </author>
    <date/>
    <area>Security</area>
    <workgroup>TLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 33?>

<t>To use TLS Encrypted ClientHello (ECH) the client needs to learn the ECH configuration for a server before it attempts a connection to the server.  This specification provides a mechanism for conveying the ECH configuration information via DNS, using a SVCB or HTTPS record.</t>
    </abstract>
  </front>
  <middle>
    <?line 37?>

<section anchor="overview">
      <name>Overview</name>
      <t>The Service Bindings framework <xref target="SVCB"/> allows server operators to publish a detailed description of their service in the Domain Name System <xref target="RFC1034"/> using SVCB or HTTPS records.  Each SVCB record describes a single "alternative endpoint", and contains a collection of "SvcParams" that can be extended with new kinds of information that may be of interest to a client.  Clients can use the SvcParams to improve the privacy, security, and performance of their connection to this endpoint.</t>
      <t>This specification defines a new SvcParam to enable the use of TLS Encrypted ClientHello <xref target="ECH"/> in TLS-based protocols.  This SvcParam can be used in SVCB, HTTPS or any future SVCB-compatible DNS records, and is intended to serve as the primary bootstrap mechanism for ECH.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="ech-param">
      <name>SvcParam for ECH configuration</name>
      <t>The "ech" SvcParamKey is defined for conveying the ECH configuration of an alternative endpoint.  It is applicable to all schemes that use TLS-based protocols (including DTLS <xref target="RFC9147"/> and QUIC version 1 <xref target="RFC9001"/>) unless otherwise specified.</t>
      <t>In wire format, the value of the parameter is an ECHConfigList (<xref section="4" sectionFormat="of" target="ECH"/>), including the redundant length prefix.  In presentation format, the value is the ECHConfigList in Base 64 Encoding (<xref section="4" sectionFormat="of" target="RFC4648"/>).  Base 64 is used here to simplify integration with TLS server software.  To enable simpler parsing, this SvcParam <bcp14>MUST NOT</bcp14> contain escape sequences.</t>
      <figure>
        <name>ECH SvcParam with a public_name of "ech-sites.example.com</name>
        <artwork><![CDATA[
ech="AEj+DQBEAQAgACAdd+scUi0IYFsXnUIU7ko2Nd9+F8M26pAGZVpz/KrWPgAEAAEAAWQ
VZWNoLXNpdGVzLmV4YW1wbGUubmV0AAA="
]]></artwork>
      </figure>
    </section>
    <section anchor="server-behavior">
      <name>Server behavior</name>
      <t>When publishing a record containing an "ech" parameter, the publisher <bcp14>MUST</bcp14> ensure that all IP addresses of TargetName correspond to servers that have access to the corresponding private key or are authoritative for the public name. (See <xref section="7.2.2" sectionFormat="of" target="ECH"/> for more details about the public name.)  Otherwise, connections will fail entirely.</t>
      <t>These servers <bcp14>SHOULD</bcp14> support a protocol version that is compatible with ECH.  At the time of writing, the compatible versions are TLS 1.3, DTLS 1.3, and QUIC version 1.  If the server does not support a compatible version, each connection attempt will have to be retried, delaying the connection and wasting resources.</t>
    </section>
    <section anchor="ech-client-behavior">
      <name>Client behavior</name>
      <t>This section describes client behavior in using ECH configurations provided in SVCB or HTTPS records.</t>
      <section anchor="disabling-fallback">
        <name>Disabling fallback</name>
        <t>The SVCB-optional client behavior specified in (<xref section="3" sectionFormat="of" target="SVCB"/>) permits clients to fall back to a direct connection if all SVCB options fail.  This behavior is not suitable for ECH, because fallback would negate the privacy benefits of ECH.  Accordingly, ECH-capable SVCB-optional clients <bcp14>MUST</bcp14> switch to SVCB-reliant connection establishment if SVCB resolution succeeded (as defined in <xref section="3" sectionFormat="of" target="SVCB"/>) and all alternative endpoints have an "ech" SvcParam.</t>
      </section>
      <section anchor="clienthello-construction">
        <name>ClientHello construction</name>
        <t>When ECH is in use, the TLS ClientHello is divided into an unencrypted "outer" and an encrypted "inner" ClientHello.  The outer ClientHello is an implementation detail of ECH, and its contents are controlled by the ECHConfig in accordance with <xref target="ECH"/>.  The inner ClientHello is used for establishing a connection to the service, so its contents may be influenced by other SVCB parameters.  For example, the requirements related to ALPN protocol identifiers in <xref section="7.1.2" sectionFormat="of" target="SVCB"/> apply only to the inner ClientHello.  Similarly, it is the inner ClientHello whose Server Name Indication (SNI) identifies the desired service.</t>
      </section>
      <section anchor="performance-optimizations">
        <name>Performance optimizations</name>
        <t>Prior to retrieving the SVCB records, the client does not know whether they contain an "ech" parameter.  As a latency optimization, clients <bcp14>MAY</bcp14> prefetch DNS records that will only be used if this parameter is not present (i.e. only in SVCB-optional mode).</t>
        <t>The "ech" SvcParam alters the contents of the TLS ClientHello if it is present.  Therefore, clients that support ECH <bcp14>MUST NOT</bcp14> issue any TLS ClientHello until after SVCB resolution has completed.  (See <xref section="5.1" sectionFormat="of" target="SVCB"/>).</t>
      </section>
    </section>
    <section anchor="interaction-with-http-alt-svc">
      <name>Interaction with HTTP Alt-Svc</name>
      <t>HTTP clients that implement both HTTP Alt-Svc <xref target="RFC7838"/> and the HTTPS record type <xref target="SVCB"/> can use them together, provided that they only perform connection attempts that are "consistent" with both sets of parameters (<xref section="9.3" sectionFormat="of" target="SVCB"/>).  At the time of writing, there is no defined parameter related to ECH for Alt-Svc.  Accordingly, a connection attempt that uses ECH is considered "consistent" with an Alt-Svc Field Value that does not mention ECH.</t>
      <t>Origins that publish an "ech" SvcParam in their HTTPS record <bcp14>SHOULD</bcp14> also publish an HTTPS record with the "ech" SvcParam for every alt-authority offered in its Alt-Svc Field Values.  Otherwise, clients might reveal the name of the server in an unencrypted ClientHello to an alt-authority.</t>
      <t>If all HTTPS records for an alt-authority contain "ech" SvcParams, the client <bcp14>MUST</bcp14> adopt SVCB-reliant behavior (as in <xref target="disabling-fallback"/>) for that RRSet.  This precludes the use of certain connections that Alt-Svc would otherwise allow, as discussed in <xref section="9.3" sectionFormat="of" target="SVCB"/>.</t>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <t>A SVCB RRSet containing some RRs with "ech" and some without is vulnerable to a downgrade attack: a network intermediary can block connections to the endpoints that support ECH, causing the client to fall back to a non-ECH endpoint.  This configuration is <bcp14>NOT RECOMMENDED</bcp14>. Zone owners who do use such a mixed configuration <bcp14>SHOULD</bcp14> mark the RRs with "ech" as more preferred (i.e. lower SvcPriority value) than those without, in order to maximize the likelihood that ECH will be used in the absence of an active adversary.</t>
        <t>In an idealized deployment, ECH protects the SNI with an anonymity set consisting of all the ECH-enabled server domains supported by a given client-facing server. Accordingly, an attacker who can enumerate this set can always guess the encrypted SNI with probability 1/K, where K is the number of domains in the set. In practice, this probability may be increased via traffic analysis, popularity weighting, and other mechanisms.</t>
        <t>An attacker who can prevent SVCB resolution can deny clients any associated security benefits. A hostile recursive resolver can always deny service to SVCB queries, but network intermediaries can often prevent resolution as well, even when the client and recursive resolver validate DNSSEC and use a secure transport. These downgrade attacks can prevent a client from being aware that "ech" is configured which could result in the client sending the ClientHello in cleartext. To prevent downgrades, <xref section="3.1" sectionFormat="of" target="SVCB"/> recommends that clients abandon the connection attempt when such an attack is detected.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is instructed to modify the Service Parameter Keys Registry entry for "ech" as follows:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Name</th>
            <th align="left">Meaning</th>
            <th align="left">Format Reference</th>
            <th align="left">Change Controller</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">5</td>
            <td align="left">ech</td>
            <td align="left">TLS Encrypted ClientHello Config</td>
            <td align="left">(This document)</td>
            <td align="left">IETF</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SVCB">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="ECH">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="August" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-20"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
