Skip to content
/ ech Public

Encrypted Client Hello with Split Mode Topology

License

Notifications You must be signed in to change notification settings

c2FmZQ/ech

Repository files navigation

Encrypted Client Hello with Split Mode Topology

This repo implements a go library to support Encrypted Client Hello with a Split Mode Topology, as described in https://datatracker.ietf.org/doc/draft-ietf-tls-esni/

flowchart LR
  subgraph Client
    c1("Client")
  end
  subgraph Client-Facing Server
    prx((("public.example.com")))
  end
  subgraph Backend Servers
    be1("private1.example.com")
    be2("private2.example.com")
  end
  c1-->prx
  prx-->be1
  prx-->be2
Loading

The ECH library handles the Client-Facing Server part. A ech.Conn transparently inspects the TLS handshake and decrypts/decodes Encrypted Client Hello messages. The decoded ServerName and/or ALPN protocols can then be used to route the TLS connection to the right backend server.

The example directory has working client and server examples.

The server code looks something like this:

        ln, err := net.Listen("tcp", *addr)
        if err != nil {
                // ...
        }
        defer ln.Close()
        for {
                serverConn, err := ln.Accept()
                if err != nil {
                        // ...
                }
                go func() {
                        ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
                        defer cancel()
                        conn, err := ech.New(ctx, serverConn, ech.WithKeys(echKeys))
                        if err != nil {
                                // ...
                                return
                        }
                        log.Printf("ServerName: %s", conn.ServerName())
                        log.Printf("ALPNProtos: %s", conn.ALPNProtos())

                        switch host := conn.ServerName(); host {
                        case "public.example.com":
                                server := tls.Server(conn, &tls.Config{
                                        Certificates:             []tls.Certificate{tlsCert},
                                        EncryptedClientHelloKeys: echKeys,
                                })
                                fmt.Fprintf(server, "Hello, this is public.example.com\n")
                                server.Close()
                        default:
                                server := tls.Server(conn, &tls.Config{
                                        Certificates: []tls.Certificate{tlsCert},
                                })
                                fmt.Fprintf(server, "Hello, this is %s\n", host)
                                server.Close()
                        }
                }()
        }

About

Encrypted Client Hello with Split Mode Topology

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Languages