This document includes observations on current use cases for SNI data in a variety of contexts. It highlights how the use of that data is important to the operators of both public and private networks and shows how the loss of access to SNI data will cause difficulties in the provision of a range of services to end-users. Some mitigations are identified that may be useful for inclusion by those considering the adoption of support for ECH in their software.
For clarity, there are circumstances where encryption of the SNI data may be a useful precaution to reduce the risk of pervasive monitoring. Whilst this document does not attempt to document those use cases, the authors accept that such cases exist; their objective is to aid understanding of the impact of ECH in particular circumstances, not to stop its development or deployment.
Andrew's proposal
This document includes observations on current use cases for SNI data in a variety of contexts. It highlights how the use of that data is important to the operators of both public and private networks and shows how the loss of access to SNI data will cause difficulties in the provision of a range of services to end-users. Some mitigations are identified that may be useful for inclusion by those considering the adoption of support for ECH in their software.
For clarity, there are circumstances where encryption of the SNI data may be a useful precaution to reduce the risk of pervasive monitoring. Whilst this document does not attempt to document those use cases, the authors accept that such cases exist; their objective is to aid understanding of the impact of ECH in particular circumstances, not to stop its development or deployment.