Open Bug 1850248 Opened 1 year ago Updated 1 month ago

Sites with invalid ECH records receive uninformative errors

Categories

(Core :: Security: PSM, enhancement, P5)

Firefox 118
enhancement

Tracking

()

ASSIGNED

People

(Reporter: djackson, Assigned: keeler)

References

(Blocks 1 open bug)

Details

Attachments

(1 file)

When sites are misconfigured and are advertising ECH records with outer SNI names which they lack a valid certificate for, the current ECH spec states that the connection must fail:

Unless ECH is disabled as a result of successfully establishing a connection to the public name, the client MUST NOT fall back to using unencrypted ClientHellos, as this allows a network attacker to disclose the contents of this ClientHello, including the SNI.

So if ECH is not negotiated then we validate against the outer public name and throw up a certificate error page accordingly. However, this error page doesn't inform the user which name Firefox was validating the certificate against or that ECH was in play which makes for a confusing error page.

As an example where there is currently causing an issue in Firefox: https://checkout.ticketpro.ca/ which currently has a DNS record of :

checkout.ticketpro.ca.	300	IN	HTTPS	1 . alpn=h3,h2 ipv4hint=158.69.134.225 ech=AEX+DQBBWgAgACC8HVR3mYqI0E74kvwqK9TEYS53nfUUlN5rfA4hNQpeYwAEAAEAAQASY2xvdWRmbGFyZS1lY2guY29tAAA=

The resulting error page is BAD_DOMAIN which is correct as it does not contain cloudflare-ech.com but looks confusing as the certificate is indeed valid for the domain the user is trying to navigate to.

We could look at improving this error page or at improving the spec so if ECH is not negotiated we accept either outer or inner SNI.

Blocks: ech
Duplicate of this bug: 1860847
Assignee: nobody → dkeeler
Status: NEW → ASSIGNED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: