<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.27 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-campling-ech-deployment-considerations-05" category="info" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="ECH Deployment Considerations">Encrypted Client Hello Deployment Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-campling-ech-deployment-considerations-05"/>
    <author initials="A. J." surname="Campling" fullname="Andrew Campling">
      <organization>419 Consulting Limited</organization>
      <address>
        <email>Andrew.Campling@419.Consulting</email>
        <uri>https://www.419.Consulting/</uri>
      </address>
    </author>
    <author initials="P." surname="Vixie" fullname="Paul Vixie">
      <organization>Red Barn</organization>
      <address>
        <email>paul@redbarn.org</email>
        <uri>http://www.redbarn.org/</uri>
      </address>
    </author>
    <author initials="D." surname="Wright" fullname="David Wright">
      <organization>UK Safer Internet Centre</organization>
      <address>
        <email>david.wright@swgfl.org.uk</email>
        <uri>https://saferinternet.org.uk/</uri>
      </address>
    </author>
    <author initials="A." surname="Taddei" fullname="Arnaud Taddei">
      <organization>Broadcom</organization>
      <address>
        <postal>
          <street>1320 Ridder Park Dr</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95131</code>
          <country>US</country>
        </postal>
        <phone>41795061129</phone>
        <email>Arnaud.Taddei@broadcom.com</email>
        <uri>https://www.linkedin.com/in/arnaudtaddei/</uri>
      </address>
    </author>
    <author initials="S." surname="Edwards" fullname="Simon Edwards">
      <organization>Broadcom</organization>
      <address>
        <postal>
          <street>1320 Ridder Park Dr</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95131</code>
          <country>US</country>
        </postal>
        <email>Simon.Edwards@broadcom.com</email>
        <uri>https://www.linkedin.com/in/simononsecurity/</uri>
      </address>
    </author>
    <date year="2023" month="March" day="27"/>
    <area>SEC</area>
    <workgroup>opsec</workgroup>
    <keyword>ECH</keyword>
    <keyword>Operators</keyword>
    <keyword>Schools</keyword>
    <keyword>Enterprises</keyword>
    <keyword>Operational Security</keyword>
    <abstract>
      <t>(Editorial note: to be updated as the text in the main body of the document is finalised)
This document is intended to inform the community about the impact of the deployment of the proposed
Encrypted Client Hello (ECH) standard that encrypts Server Name
Indication (SNI) and other data.  Data encapsulated by ECH (ie data
included in the encrypted ClientHelloInner) is of legitimate interest
to on-path security actors including those providing inline malware detection, parental
controls, content filtering to prevent access to malware and other risky traffic, mandatory security controls etc.</t>
      <t>The document includes observations on current use cases for SNI data
in a variety of contexts.  It highlights how the use of that data is
important to the operators of both public and private networks and shows how the loss
of access to SNI data will cause difficulties in the provision of a
range of services to end-users, including the potential weakening of cybersecurity defences.
Some mitigations are identified that may be useful for inclusion by those considering the adoption
of support for ECH in their software.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="background">
        <name>Background</name>
        <t>In order to establish its handshake, the TLS protocol needs to start with a first handshake message called the Client Hello. As this handshake message is in clear text, it exposes metadata, e.g. the Server Name Indication (SNI) which allow middleboxes on path to make policy decisions, in particular but not only for security reasons. As part of a wider initiative to achieve end-to-end encryption, a proposed extension to TLS 1.3 called Encrypted Client Hello (ECH) <xref target="I-D.draft-ietf-tls-esni"/> is attempting to encrypt all the remaining metadata in the clear.</t>
        <t>There are use cases where encryption of the SNI data may be a useful precaution to reduce the risk of pervasing monitoring that offers some benefits (e.g Enterprises offering services for their own customers will appreciate that their customers' privacy be better protected). However ECH presents challenges for other use cases (e.g. Enterprises needing network security controls for compliance reasons).</t>
        <t>The Internet was envisaged as a network of networks, each able to
determine what data to transmit and receive from their peers.
Developments like ECH mark a fundamental change in the architecture
of the Internet, allowing opaque paths to be established from
endpoints to commercial services, some potentially without the
knowledge or permission of the device owners.  This change should not
be undertaken lightly given both the architectural impact on the
Internet and potentially adverse security implications for end users.
Given these implications, it certainly should not be undertaken
without either the knowledge of or consultation with end users, as
outlined in <xref target="RFC8890"/>.</t>
        <t>Whilst it is reasonable to counter that VPNs also establish opaque
paths, a primary difference is that the use of a VPN is a deliberate
act by the user, rather than a choice made by client software,
potentially without either the knowledge and/or consent of the end-
user or device owner.</t>
        <t><xref target="RFC7258"/> discusses the critical need to protect users'
privacy when developing IETF specifications and also recognises that
making networks unmanageable to mitigate pervasive monitoring is not
an acceptable outcome.</t>
        <t><xref target="RFC8404"/> discusses current security and network operations
as well as management practices that may be impacted by the shift to
increased use of encryption to help guide protocol development in
support of manageable and secure networks.  As <xref target="RFC8404"/> notes, "the
implications for enterprises that own the data on their networks or
that have explicit agreements that permit the monitoring of user
traffic are very different from those for service providers who may
be accessing content in a way that violates privacy considerations".</t>
      </section>
      <section anchor="scope-objectives-and-limits-of-this-document">
        <name>Scope, objectives and limits of this document</name>
        <t>This document considers the implications of ECH for private, edge and public networks using the examples of education establishments, enterprises and public operators. It addresses the limitations of <xref target="RFC8744"/>
by providing more information about the issues posed by the
introduction of ECH due to the loss of visibility of SNI data on
private networks building on the report from a roundtable discussion <xref target="ECH_Roundtable"/>.</t>
        <t>The objective of this document is to detail the various operational impacts of ECH. It will focus specifically on
the impact of encrypting the SNI data by ECH,
but it should be noted that other elements in the client hello may also be relevant for some
on-path security methods.</t>
        <t>The data encapsulated by ECH is of legitimate interest to on-path
security actors including those providing inline malware detection,
firewalls, parental controls, content filtering to prevent access to malware
and other risky traffic, mandatory security controls (e.g. Data Loss Prevention) etc. Beyond network security, there are various operational impacts of different types e.g. network management, content filtering, etc.</t>
        <t>Whilst this document identifies operational issues, it does not consider solutions nor question the development of the ECH proposal itself.</t>
      </section>
    </section>
    <section anchor="general-considerations-about-the-encryption-of-the-client-hello">
      <name>General considerations about the encryption of the Client Hello</name>
      <section anchor="about-encrypting-the-server-name-indication-sni">
        <name>About encrypting the Server Name Indication (SNI)</name>
        <t><xref target="RFC8744"/> describes the general problem of encrypting the
Server Name Identification (SNI) TLS extension.  The document
includes a brief description of what it characterises as
"unanticipated" usage of SNI information (section 2.1) as well as a
brief (two paragraph) assessment of alternative options in the event
that the SNI data is encrypted (section 2.3).</t>
        <t>The text in <xref target="RFC8744"/> suggests that most of the unanticipated SNI
usage "could also be implemented by monitoring DNS traffic or
controlling DNS usage", although it does then acknowledge the
difficulties posed by encrypted DNS protocols.  It asserts, with
limited evidence, that "most of 'the unanticipated usage' functions
can, however, be realized by other means", although without
considering or quantifying the affordability, operational complexity,
technical capability of affected parties or privacy implications that
might be involved.  It is unclear from the document whether any
stakeholders that may be impacted by the encryption of SNI data have
been consulted; it certainly does not appear to be the case that any such
consultation has taken place.</t>
        <t>The characterisation of "unanticipated usage" of SNI data could be
taken to imply that such usage was not approved and therefore
inappropriate in some manner.  The reality is that the development of
the Internet has many examples of permissionless innovation and so
this "unanticipated usage" of SNI data should not be dismissed as lacking in
either importance or validity.</t>
      </section>
      <section anchor="why-are-middleboxes-using-the-sni">
        <name>Why are middleboxes using the SNI?</name>
        <t>(Editor note: draft, to be extended in a future revision). For middleboxes to be able to perform their job they need to identify the destination of the requested communication. Before TLS1.3 a middlebox could rely on, at least, 3 metadata sources: The certificate, the DNS name and the SNI. A middlebox may have used some or all of these metadata to determine the destination in the best possible way. Yet, as part of the current initiative to complete end-to-end encryption, the certificate was encrypted into TLS1.3, then DoH/DoT/DoQ are encrypting the DNS flow to its resolver making it harder for middleboxes to use this information. Even if the DNS data can be accessed, it canbe misleading in some situations (does it point to the real destination, or just the site hosting server name, or a proxy?) and the SNI was invented to overcome some of the limitations of the DNS data by providing additional information. However, the SNI in itself may be unreliable which is why middleboxes start by non-trusting it until they have validated the information that it provides.</t>
      </section>
      <section anchor="network-assets-using-the-sni">
        <name>Network assets using the SNI</name>
        <section anchor="different-network-types">
          <name>Different network types</name>
          <t>(Editorial note: develop issue #46 here)</t>
        </section>
        <section anchor="characterisation-of-network-assets-using-the-sni">
          <name>Characterisation of network assets using the SNI</name>
          <t>(Editorial note: This work identified the potential to list middleboxes using the SNI. This is a non trivial task but would be worthwile to identify the magnitude of problems and to further develop the migration issues section later)</t>
        </section>
        <section anchor="the-case-of-transparent-proxies">
          <name>The case of Transparent Proxies</name>
          <t>A proxy server is a server application that acts as an intermediary
between a client requesting a resource and the server providing that
resource.  Instead of connecting directly, the client directs the
request to the proxy server which evaluates the request before
performing the required network activity.  Proxies are used for
various purposes including load balancing, privacy and security.</t>
          <t>Traditionally, proxies are accessed by configuring a user's
application or network settings, with traffic diverted to the proxy
rather than the target destination.  With "transparent" proxying, the
proxy intercepts packets directed to the destination, making it seem
as though the request is handled by the target destination itself.</t>
          <t>A key advantage of transparent proxies is that they work without
requiring the configuration of user devices or software.  They are
commonly used by organisations to provide content filtering for
devices that they don't own that are connected to their networks.
For example, some education environments use transparent proxies to
implement support for “bring your own device” (BYOD) without needing to load software on third-
party devices.</t>
          <t>Transparent proxies use SNI data to understand whether a user is
accessing inappropriate content without the need to inspect data
beyond the SNI field.  Because of this, encryption of the SNI field,
as is the case with ECH, will disrupt the use of transparent proxies, requiring far more intrusive data inspection to be undertaken instead.</t>
        </section>
        <section anchor="the-case-of-non-transparent-proxies">
          <name>The case of non-transparent proxies</name>
          <t>(Editorial note: Potential contribution)</t>
        </section>
      </section>
    </section>
    <section anchor="the-education-sector">
      <name>The Education Sector</name>
      <section anchor="context">
        <name>Context</name>
        <t>Focusing specifically on the education sector, the primary issue
caused by ECH is that it is likely to circumvent the safeguards
applied to protect children through content filtering, whether in the
school or home environments, adding to adverse impacts already
introduced through the use of encrypted DNS protocols such as DNS
over HTTPS <xref target="RFC8484"/>.</t>
        <t>Content filtering that leverages SNI information is used by education
establishments to protect children from exposure to malicious, adult,
extremist and other content that is deemed either age-inappropriate
or unsuitable for other reasons.  Any bypassing of content filtering
by client software on devices will be problematic and may compromise
duties placed on education establishments.  For example: schools in
England and Wales have obligations to provide "appropriate
filtering systems" <xref target="KCSE"/>; schools in the US use Internet
filters and implement other measures to protect children from harmful
online content as a condition for the receipt of certain federal
funding, especially E-rate funds <xref target="CIPA"/>.</t>
      </section>
      <section anchor="why-content-filtering-matters-to-schools">
        <name>Why Content Filtering Matters to Schools</name>
        <t>The impact that ineffective content filtering can have on an
educational institutions should not be underestimated.  For example, a
coroner in the UK in 2021 ruled that a school's failure to prevent a
pupil from accessing harmful material online on its equipment
contributed to her taking her own life <xref target="Coroner"/>.  In this particular
instance, the filtering software installed at the school was either
faulty or incorrectly configured but the case highlights the harmful risks
posed if the filtering is bypassed by client software using ECH.</t>
      </section>
      <section anchor="mitigations">
        <name>Mitigations</name>
        <t>Whilst it may be possible for schools to overcome some of the issues
ECH raises by adopting similar controls to those used by enterprises,
it should be noted that most schools have a very different budget for
IT compared to enterprises and usually have very limited technical
support capabilities.  Therefore, even where technical solutions
exist that may allow them to continue to meet their compliance
obligations, affordability and operational expertise will present
them with significant difficulties.</t>
        <t>Absent funding and technical expertise, schools will need to consider
the best way forward that allows them to remain compliant.  If client
software does not allow ECH to be disabled, any such software that
implements support for ECH may need to be removed from school devices
and replaced, assuming that suitable alternatives are available.
This will have a negative impact on budgets and may be operationally
challenging if institutions have made a significant investment in the
deployment and use of particular applications and technologies.</t>
        <t>There are instances where policies in education establishments allow
for the use of equipment not owned by the institution, including
personal devices and the devices of contractors and site visitors.
These devices are unlikely to be configured to use the institution's
proxy but can nevertheless connect to the school network using a
transparent proxy (see below).  Transparent proxies used for
filtering will typically use SNI data to understand whether a user is
accessing inappropriate data, so encrypting the SNI field will
disrupt the use of these transparent proxies.</t>
      </section>
      <section anchor="implications">
        <name>Implications</name>
        <t>In the event that transparent proxies are no longer effective,
institutions will either have to require more invasive software to be
installed on third party devices before they can be used along with
ensuring they have the capability to comprehend and adequately manage
these technologies or will have to prevent those devices from
operating.  Neither option is desirable.</t>
      </section>
    </section>
    <section anchor="impact-of-ech-in-private-network-contexts-enterprises-or-other-organizations">
      <name>Impact of ECH in private network contexts (Enterprises or other organizations)</name>
      <section anchor="context-1">
        <name>Context</name>
        <section anchor="the-main-requirements">
          <name>The main requirements</name>
          <t>Enterprises and Organizations need to protect themselves for a vast number of reasons, mainly:</t>
          <ul spacing="normal">
            <li>Reduce their Risks. And in particular as part of any Cyber Resilience strategy.</li>
            <li>Protect their Reputation. The term Reputation includes many aspects way beyond the traditional enterprises and organization assets (data, etc.).</li>
            <li>Comply to a growing diverse set of Policies, Regulations, Certifications, Labeling and Guidelines. These requirements are growing in both scope and complexity as they are added to by various national and regional bodies around the world.</li>
          </ul>
        </section>
        <section anchor="a-degrading-threat-landscape">
          <name>A degrading threat landscape</name>
          <t>In addition, the general threat landscape which was already very large (see <xref target="I-D.draft-mcfadden-smart-threat-changes"/>), has significantly increased in three ways:</t>
          <ul spacing="normal">
            <li>COVID crisis generally accelerated the overall attack landscape. Indeed as the crisis forced many enterprises and organizations to accelerate their digital transformation, it increased the opportunity for cyber criminals and nation states to launch more attacks, leverage innovations to their advantage, better select their targets, increase their efficiency and increase their rewards, in particular with Ransomware based attacks.</li>
            <li>The Supply Chain is under stress as per the <xref target="SOLARWIND"/> attack</li>
            <li>Nation State attacks are continuing to evolve, for example as noted to those linked to the current Ukraine crisis.</li>
          </ul>
          <t>Attacks are now damaging enterprises and other organizations with ransomware being the number 1 issue by a considerable margin. The attacks are increasing in severity, to the extent that this is now being measured at macroscopic level in some countries:</t>
          <ul spacing="normal">
            <li>EUR1B loss of revenue for French organizations from January to August 2022 <xref target="LOSSINREVENUE"/></li>
            <li>Loss in capitalisation between 1-5% <xref target="LOSSINCAP"/></li>
            <li>Degradation by credit notation agencies <xref target="LOSSINCREDITSCORE"/></li>
          </ul>
          <t>Another implication from the COVID crisis is the acceleration of BYOD
with the current reliance on remote working. This has created two side effects for remote employees, contractors and third parties that need to connect to one or more enterprise
networks on a temporary basis:</t>
          <ul spacing="normal">
            <li>need to use a VPN access to the corporate network, which brings all the benefits (e.g. protected access to corporate network) and risks that VPNs may open (e.g. lateral movement when the end point is compromised),</li>
            <li>need to access a cloud proxy which requires an agent to be installed on the device to steer the traffic to the right place.</li>
          </ul>
        </section>
      </section>
      <section anchor="mitigations-1">
        <name>Mitigations</name>
        <t>In such circumstances, requiring
software or custom configurations to be installed on those devices
may be problematic (see <xref target="I-D.draft-taddei-smart-cless-introduction"/>).</t>
        <t>This is why network security solutions are required and this is why the use of ECH to prevent access to the SNI data makes it impossible for blue teams to defend (see the next sections for details).</t>
        <t>Finally there is a global shortage of cybersecurity personnel. Any expansion of technical requirements, for example to mitigate the operational challenges through the introduction of ECH, will exacerbate the problem.</t>
        <t>All the above conditions are weighing on capabilities to defend, both:</t>
        <ul spacing="normal">
          <li>Directly: a lack of visibility on a key meta data like the SNI will cause significant issues to enterprises and organizations</li>
          <li>Indirectly: should ECH happen and should alternative be provided, managing migrations to any alternative not requiring access to the SNI, in these conditions, is undesirable from a timing, resources, capacities and risks perspectives.</li>
        </ul>
      </section>
      <section anchor="implications-1">
        <name>Implications</name>
        <section anchor="examples-of-regulatory-implications">
          <name>Examples of regulatory implications</name>
          <t>Regulators are accelerating their lawfare capabilities at accelerated pace and new legislations is impacting on the actions of enterprises with increased precision. The EU GDPR had ripple effects such as requiring Financial Institutions to use selective decrypt in order to implement Data Loss Prevention. The recent indication that US regulators are in the process of levying fines of $200m each on a number of institutions because they were unable to track all communications by their employees using WhatsApp or Signal , <xref target="Bloomberg"/>, creates new auditability constraints. It is with growing concern that an ECH enabled ecosystem may clash with future regulatory requirements.</t>
        </section>
        <section anchor="impact-of-ech-deployment-on-network-security-operations">
          <name>Impact of ECH deployment on Network Security Operations</name>
          <section anchor="reminders-on-network-security">
            <name>Reminders on Network Security</name>
            <t>Network Security is a set of security capabilities which is articulated as part of a defense strategy, e.g. Defense In Depth <xref target="NIST-DID"/>, Zero Trust, SASE/SSE, etc. and can trigger and enable other security capabilities such as sandboxing, Data Loss Prevention, Cloud Access Service Broker (CASB), etc. One constituency is a Web Proxy, combining both a TLS proxy and an application level (HTTP) proxy.</t>
            <t>In the same way that <xref target="I-D.draft-ietf-opsec-ns-impact"/> showed the impact of TLS1.3 on operational security, a loss of visibility of the SNI as indicator of compromise (see <xref target="I-D.draft-ietf-opsec-indicators-of-compromise"/>) has two main implications</t>
          </section>
          <section anchor="implications-from-loss-of-meta-data">
            <name>Implications from loss of Meta Data</name>
            <t>The loss of visibility of the SNI, at TLS level, will prevent transparent proxies from applying corporate policies to manage risk and compliancy. Typical examples:</t>
            <ul spacing="normal">
              <li>categories of compromised sites cannot be applied anymore, exposing employees and their organisations to potential cybersecurity risks; alternative approaches to block access to theses sites need to be found</li>
              <li>corporate lists of excluded sites for compliance or policy reasons need alternatives ways to be blocked.</li>
            </ul>
          </section>
          <section anchor="implications-from-loss-of-selective-decrypt">
            <name>Implications from loss of Selective Decrypt</name>
            <t>TLS proxies also have the ability to selectively intercept, avoiding any visibility into or modification of the original application protocol payload - but such selective intercept relies heavily on knowledge of the origin content server hostname, which can be extracted in plaintext from the TLS ClientHello SNI (server name) field.</t>
            <t>This capability allows the application proxy, in particular an HTTPS proxy to engage efficiently specific security controls, e.g. Data Loss Prevention, Sandboxing, etc.</t>
            <t>The loss of SNI visibility will make it more difficult for corporate user flows to be intercepted, with it becoming impossible for BYOD use cases.</t>
            <t>This will create inefficiencies, will require more resources and will increase security risks. It will also be counter productive for privacy as it may require the proxy to decrypt the whole TLS connection.</t>
          </section>
        </section>
        <section anchor="specific-implications-for-smbs">
          <name>Specific implications for SMBs</name>
          <t>Small and Medium Business (SMBs) form a particularly vulnerable subset of enterprises and organizations and span from Small Office Home Office (SOHO, sometimes a one person business) to Medium Business with strong variations depending on the country (a 50 employee company is considered the upper range of SMB business in developing countries while it is up to 25,000 in some developed countries).</t>
          <t>Similarly to the above education use case and irrespective of definitions, many SMBs have very limited in-house capabilities to defend themselves, with security often outsourced to Managed Security Service Providers (typically network operators, mid range and small service providers).</t>
        </section>
      </section>
    </section>
    <section anchor="public-network-service-providers">
      <name>Public Network Service Providers</name>
      <section anchor="context-2">
        <name>Context</name>
        <t>In Public Networks the national, regional and international legislator has to balance between freedom of access to the information on the one hand, and safety of the Internet and the protection of other fundamental rights on the other hand.</t>
        <t>There are 2 main approaches:</t>
        <ul spacing="normal">
          <li>First, there are countries which do not have any specific legislation on the issue of blocking, filtering and takedown of illegal Internet content: there is no legislative or other regulatory system put in place by the state with a view to defining the conditions and the procedures to be respected by those who engage in the blocking, filtering or takedown of online material. In the absence of a specific or targeted legal framework, several countries rely on an existing "general" legal framework that is not specific to the Internet to conduct what is, generally speaking, limited blocking or takedown of unlawful online material. Here the approach has been differentiated in relying on self regulation from the private sector or limited political or legislative intervention to specific areas.</li>
          <li>The other approach has been to set up a legal framework specifically aimed at the regulation of the Internet and other digital media, including the blocking, filtering and removal of Internet content. Such legislation typically provides for the legal grounds on which blocking or removal may be warranted, the administrative or judicial authority which has competence to take appropriate action and the procedures to be followed.</li>
        </ul>
      </section>
      <section anchor="mitigations-2">
        <name>Mitigations</name>
        <section anchor="current-approaches-and-procedures">
          <name>Current approaches and procedures</name>
          <t>In relation to specific areas where the public interest has to be protected more strongly, such as child abuse crimes, terrorism, criminality and national security, many states have a framework for the urgent removal of Internet content regarding the above materials without the need of a court order. In such circumstances, administrative authorities, police authorities or public prosecutors are given specific powers to order Internet access providers to block access without advance judicial authority. It is common to see such orders requiring action on the part of the Internet access provider within 24 hours, and without any notice being given to the content provider or host themselves.</t>
          <t>Particularly in relation to material concerning child abuse and other serious crimes, many countries adopt a “list” system, whereby a central list of blocked URLs or domain names are maintained and updated by the relevant administrative authority. This is notified to the relevant Internet access providers, who are required to ensure that blocking is enforced.
Additionally in some states the authorities can request the removal of content that infringes intellectual property, privacy or defamation rights. In this case the removal need to be requested by a court order.</t>
          <t>Generally speaking, the grounds relied on broadly correspond to the interests protected under Article 10(2) of the European Convention of Human Rights (ECHR), namely: the protection of national security, territorial integrity or public safety, the prevention of disorder or crime, the protection of health or morals, the protection of the reputation or rights of others, and the prevention of the disclosure of information received in confidence.
From the methodology we have to distinguish between blocking or takedown of content.</t>
          <ul spacing="normal">
            <li>The blocking, filtering or prevention of access to Internet content are generally technical measures intended to restrict access to information or resources typically hosted in another jurisdiction. Such action is normally taken by the Internet access provider through hardware or software products that block specific targeted content from being received or displayed on the devices of customers of the Internet access provider.</li>
            <li>Takedown or removal of Internet content, on the other hand, will instead broadly refer to demands or measures aimed at the website operator (or "host") to remove or delete the offending website content or sub content.</li>
          </ul>
          <t>In these considerations we will refer to blocking only.</t>
        </section>
        <section anchor="the-blocking-use-case">
          <name>The blocking use case</name>
          <t>This can be achieved through a number of techniques, including the blocking of the Domain Name System (DNS), the analysis of the SNI field or the Uniform Resource Locator (URL).
Given the increasing adoption of encryption techniques often a mixture of the above techniques is needed.</t>
          <t>In particular for the most serious crimes such as child abuse or national security many countries adopt a “list” methodology, where a central list of blocked Domains or URLs is maintained by the authorities and updated on a regular basis (daily or even hourly) and shared with Public Network Operators that have to enforce the blocking.</t>
          <t>In many jurisdictions there are legal consequences for the Operator not complying with the blocking order.</t>
          <t>Technically the blocking can be implemented using techniques that have been adapted over time as new technologies have been introduced.</t>
          <t>Historically  depending on the content of the list the technique have been based on DNS or proxy blocking.</t>
          <t>DNS is effective on Domains (the whole domain is blocked), while proxy is effective either on Domain (for encrypted traffic) or URL (for unencrypted traffic).</t>
          <t>Given that nowadays the vast majority of traffic is encrypted, the capability of blocking based on URL is limited to a small portion of traffic and proxy blocking is as effective as that based on the DNS.</t>
          <t>Theoretically DNS blocking would be the preferred option for operators given the more limited investments necessary to implement blocking of the Domains, but given the increased usage of external encrypted DNS services DNS blocking is becoming less effective and operators need to use SNI analysis as well in order to fulfil legal obligations.</t>
        </section>
      </section>
      <section anchor="implications-2">
        <name>Implications</name>
        <t>The adoption of ECH will cause additional problems and limit the possibility of implementing operators fulfilling their legal blocking obligations, exposing the population to illegal content related to crimes such as Child Sex Abuse Material (CSAM), malware and other malicious content, and possibly even content deemed to be detrimental to National Security.</t>
        <t>In addition, operators that do not fulfil their legal obligations may be exposed to legal or regulatory remedies.</t>
      </section>
    </section>
    <section anchor="general-issues">
      <name>General issues</name>
      <section anchor="threat-detection">
        <name>Threat Detection</name>
        <t><xref target="RFC8404"/> identifies a number of issues arising from increased
encryption of data, some of which apply to ECH.  For example, it
notes that an early trigger for DDoS mitigation involves
distinguishing attacker traffic from legitimate user traffic; this
become more difficult if traffic sources are obscured.</t>
        <t>The various indicators of compromise (IoCs) are documented in <xref target="I-D.draft-ietf-opsec-indicators-of-compromise"/>, which also describes how they
are used effectively in cyber defence. For example, section 4.1.1 of
the document describes the importance of IoCs as part of a defence-
in-depth strategy; in this context, SNI is just one of the range of
indicators that can be used to build up a resilient defence (see
section 3.1 in the same document on IoC types and the 'pyramid of
pain').</t>
        <t>In the same Internet-Draft, section 6.1 expands on the importance of
the defence in depth strategy.  In particular, it explains the role
that domains and IP addresses can play, especially where end-point
defences are compromised or ineffective, or where endpoint security
isn't possible, such as in BYOD, IoT and legacy environments.  SNI
data plays a role here, in particular where DNS data is unavailable
because it has been encrypted; if SNI data is lost too, alongside
DNS, defences are weakened and the attack surface increased.</t>
      </section>
      <section anchor="endpoint-security-limits">
        <name>Endpoint security limits</name>
        <t>(Editorial note: Elaborate on endpoint security complications as <xref target="I-D.draft-taddei-smart-cless-introduction"/> as well as <xref target="MAGECART"/> <xref target="MITB"/> <xref target="MITB-MITRE"/> <xref target="MALVERTISING"/> showed that in some cases, the only way to detect an attack is through the use of network-based security. The loss of visibility of the SNI data will make it much harder to detect attacks. The endpoints components (operating system, applications, browsers, etc.) cannot be judge and jury.)</t>
      </section>
      <section anchor="network-management">
        <name>Network management</name>
        <t>(Editorial note: this is a placeholder for future issues)</t>
      </section>
      <section anchor="future-operational-deployment-issues-due-to-the-introduction-of-the-client-facing-servers-themselves">
        <name>Future operational deployment issues due to the introduction of the Client Facing servers themselves</name>
        <t>(Editorial note: this is a placeholder for future issues;</t>
        <ul spacing="normal">
          <li>Consolidation considerations - the use of ECH may accelerate the move of content away from standalone servers and on to CDNs, reducing infrastructure resilience.</li>
          <li>What happens if Client Facing servers are controlled by malicious actors?</li>
          <li>The Client Facing servers are acting as a new category of middleboxes. In this shift left movement, until the attack surface is minimal and complexities are removed, you have to rely on third parties for inspection. In these conditions, on which basis can they be more trusted than any other middleboxes? Is this creating a concentration problem?</li>
        </ul>
        <t>)</t>
      </section>
      <section anchor="migration-issues">
        <name>Migration issues</name>
        <t>(Editorial note: this is a placeholder for future issues;</t>
        <ul spacing="normal">
          <li>If ECH is enforced what are the solutions to all the above problems and what are the migration paths?</li>
        </ul>
        <t>)</t>
      </section>
    </section>
    <section anchor="potential-further-development-of-this-work">
      <name>Potential further development of this work</name>
      <section anchor="potential-development-of-this-document">
        <name>Potential development of this document.</name>
        <t>This section lists potential development of this work in particular for the General Issues section.</t>
        <ul spacing="normal">
          <li>There are need for further clarifications from the ECH draft, e.g. The link between the Client Facing and the backend servers are not clear enough and need further description. It can't be just 'left to the implementation'. The action is still underway and feedback to the TLS working group will be provided.</li>
          <li>Will there be any impact to the DNS by adding so many new RRs?</li>
        </ul>
      </section>
      <section anchor="potential-development-outside-of-the-scope-of-this-document">
        <name>Potential development outside of the scope of this document</name>
        <t>This document infers a number of ideas that could be relevant for other groups and in other deliverables. In particular regarding what type of solutions could be considered</t>
        <ul spacing="normal">
          <li>There is a need to address the apparent disconnect between user privacy and security, it should be possible to provide both rather than one compromising the other.</li>
          <li>What prevents a Client Facing server providing security solutions to protect the data path?</li>
          <li>Given some of the many challenges there is the opportunity to review the current ECH proposal from the perspective of a respectful inspection protocol.</li>
        </ul>
      </section>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>Access to SNI data is sometimes necessary in order for institutions,
including those in the education and finance sectors, to discharge
their compliance obligations.  The introduction of ECH in client
software poses operational challenges that could be overcome on
devices owned by those institutions if policy settings are supported
within the software that allows the ECH functionality to be disabled.</t>
      <t>(Editorial note: these two below paragraph need revision towards the end of the development of this draft)</t>
      <t>Third-party devices pose an additional challenge, primarily because
the use of ECH will render transparent proxies inoperable.  The most
likely solution is that institutions will require the installation of
full proxies and certificates on those devices before they are
allowed to be connected to the host networks.  They may alternatively
determine that such an approach is impractical and instead withdraw
the ability for network access by third-party devices.</t>
      <t>An additional option that warrants further consideration is the
development of a standard that allows a network to declare its policy
regarding ECH and other such developments.  Clients would then have
the option to continue in setting up a connection if they are happy
to accept those policies, or to disconnect and try alternative
network options if not.  Such a standard is outside of the scope of
this document but may provide a mechanism that allows the interests
and preferences of client software, end-users and network operators
to be balanced.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In addition to introducing new operational and financial issues, the
introduction of SNI encryption poses new challenges for threat
detection which this document outlines.</t>
      <t>This I-D should help improve security in deployments of ECH.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgment">
      <name>Acknowledgment</name>
      <t>In memory of Simon Edwards who passed away in the night of 8th-9th of January 2023.</t>
      <t>In addition to the authors, this document is the product of an
informal group of experts including the people listed in the Contributors list in Appendix.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CIPA" target="https://www.fcc.gov/consumers/guides/childrens-internet-protection-act/">
          <front>
            <title>Children's Internet Protection Act (CIPA)</title>
            <author>
              <organization>FCC</organization>
            </author>
            <date year="2019" month="December" day="30"/>
          </front>
        </reference>
        <reference anchor="Coroner" target="https://www.judiciary.uk/publications/frances-thomas-prevention-of-future-deaths-report/">
          <front>
            <title>Prevention of future deaths report</title>
            <author initials="" surname="Henderson" fullname="Henderson">
              <organization/>
            </author>
            <date year="2021" month="November" day="26"/>
          </front>
        </reference>
        <reference anchor="ECH_Roundtable" target="https://419.consulting/encrypted-client-hello/">
          <front>
            <title>Encrypted Client Hello - Notes from an ECH Roundtable</title>
            <author>
              <organization>419 Consulting</organization>
            </author>
            <date year="2021" month="August" day="18"/>
          </front>
        </reference>
        <reference anchor="KCSE" target="https://419.consulting/encrypted-client-hello/">
          <front>
            <title>Keeping children safe in education 2021</title>
            <author>
              <organization>DfE</organization>
            </author>
            <date year="2021" month="November" day="01"/>
          </front>
        </reference>
        <reference anchor="Bloomberg" target="https://www.bloomberg.com/news/articles/2022-08-16/wall-street-sticker-shock-whatsapp-fines-were-years-in-making">
          <front>
            <title>Wall Street's Record Fines Over WhatsApp Use Were Years in the Making</title>
            <author initials="S." surname="Spezzati" fullname="Stefania Spezzati">
              <organization>Bloomberg</organization>
            </author>
            <author initials="M." surname="Robinson" fullname="Matt Robinson">
              <organization>Bloomberg</organization>
            </author>
            <author initials="L." surname="Beyoud" fullname="Lydia Beyoud">
              <organization>Bloomberg</organization>
            </author>
            <date year="2022" month="August" day="16"/>
          </front>
        </reference>
        <reference anchor="MAGECART" target="https://en.wikipedia.org/wiki/Web_skimming#Magecart">
          <front>
            <title>Magecart</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2022" month="April" day="03"/>
          </front>
        </reference>
        <reference anchor="MALVERTISING" target="https://en.wikipedia.org/wiki/Malvertising">
          <front>
            <title>Malvertising</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2022" month="June" day="02"/>
          </front>
        </reference>
        <reference anchor="MITB" target="https://owasp.org/www-community/attacks/Man-in-the-browser_attack">
          <front>
            <title>Man-in-the-browser attack</title>
            <author>
              <organization>OWASP</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MITB-MITRE" target="https://attack.mitre.org/techniques/T1185/">
          <front>
            <title>Browser Session Hijacking - T1185</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date year="2022" month="February" day="25"/>
          </front>
        </reference>
        <reference anchor="NIST-DID" target="https://csrc.nist.gov/glossary/term/defense_in_depth#:~:text=Definition(s)%3A,and%20missions%20of%20the%20organization.">
          <front>
            <title>Glossary - defense-in-depth</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SOLARWIND" target="https://symantec.broadcom.com/en/solarwinds-sunburst-attacks">
          <front>
            <title>SolarWinds (Sunburst) Attack What You Need to Know</title>
            <author>
              <organization>Symantec, a Division of Broadcom Software Group</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="LOSSINCAP" target="https://www.amf-france.org/sites/default/files/2020-02/etude-sur-la-cybercriminalite-boursiere-_-definition-cas-et-perspectives.pdf">
          <front>
            <title>La cybercriminalité boursière – définition, cas et perspectives</title>
            <author initials="A." surname="Neyret" fullname="Alexandre Neyret">
              <organization/>
            </author>
            <author>
              <organization>Autorité des Marchés Financiers</organization>
            </author>
            <date year="2019" month="October" day="10"/>
          </front>
        </reference>
        <reference anchor="LOSSINCREDITSCORE" target="https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Risk/gx-risk-gra-beneath-the-surface.pdf">
          <front>
            <title>Beneath the surface of a cyberattack – A deeper look at business impacts</title>
            <author>
              <organization>Deloitte</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="LOSSINREVENUE" target="https://anozrway.com/wp-content/uploads/dlm_uploads/2022/09/ANOZR-WAY_Barometre-Ransomware_edition-septembre-2022.pdf">
          <front>
            <title>BAROMÈTRE ANOZR WAY DU RANSOMWARE</title>
            <author>
              <organization>ANOZR WAY</organization>
            </author>
            <date year="2022" month="September" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC8890">
          <front>
            <title>The Internet is for End Users</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8890"/>
          <seriesInfo name="DOI" value="10.17487/RFC8890"/>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC8404">
          <front>
            <title>Effects of Pervasive Encryption on Operators</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
              <organization/>
            </author>
            <date month="July" year="2018"/>
            <abstract>
              <t>Pervasive monitoring attacks on the privacy of Internet users are of serious concern to both user and operator communities.  RFC 7258 discusses the critical need to protect users' privacy when developing IETF specifications and also recognizes that making networks unmanageable to mitigate pervasive monitoring is not an acceptable outcome: an appropriate balance is needed.  This document discusses current security and network operations as well as management practices that may be impacted by the shift to increased use of encryption to help guide protocol development in support of manageable and secure networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8404"/>
          <seriesInfo name="DOI" value="10.17487/RFC8404"/>
        </reference>
        <reference anchor="RFC8744">
          <front>
            <title>Issues and Requirements for Server Name Identification (SNI) Encryption in TLS</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document describes the general problem of encrypting the Server Name Identification (SNI) TLS parameter. The proposed solutions hide a hidden service behind a fronting service, only disclosing the SNI of the fronting service to external observers. This document lists known attacks against SNI encryption, discusses the current "HTTP co-tenancy" solution, and presents requirements for future TLS-layer solutions. </t>
              <t>In practice, it may well be that no solution can meet every requirement and that practical solutions will have to make some compromises.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8744"/>
          <seriesInfo name="DOI" value="10.17487/RFC8744"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="October" year="2022"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-indicators-of-compromise">
          <front>
            <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
            <author fullname="Kirsty Paine" initials="K." surname="Paine">
              <organization>Splunk Inc.</organization>
            </author>
            <author fullname="Ollie Whitehouse" initials="O." surname="Whitehouse">
              <organization>Binary Firefly</organization>
            </author>
            <author fullname="James Sellwood" initials="J." surname="Sellwood">
         </author>
            <author fullname="Andrew S" initials="A." surname="S">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="3" month="February" year="2023"/>
            <abstract>
              <t>   Cyber defenders frequently rely on Indicators of Compromise (IoCs) to
   identify, trace, and block malicious activity in networks or on
   endpoints.  This draft reviews the fundamentals, opportunities,
   operational limitations, and recommendations for IoC use.  It
   highlights the need for IoCs to be detectable in implementations of
   Internet protocols, tools, and technologies - both for the IoCs'
   initial discovery and their use in detection - and provides a
   foundation for approaches to operational challenges in network
   security.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-indicators-of-compromise-04"/>
        </reference>
        <reference anchor="I-D.draft-mcfadden-smart-threat-changes">
          <front>
            <title>BCP72 - A Problem Statement</title>
            <author fullname="Mark McFadden" initials="M." surname="McFadden">
              <organization>internet policy advisors</organization>
            </author>
            <date day="22" month="January" year="2022"/>
            <abstract>
              <t>   RFC3552/BCP72 describes an Internet Threat model that has been used
   in Internet protocol design. More than eighteen years have passed
   since RFC3552 was written and the structure and topology of the
   Internet have changed. With those changes comes a question: has the
   Internet Threat Model changed? Or, is the model described in RFC3552
   still mostly accurate?  This draft attempts to describe a non-
   exhaustive list of changes in the current threat environment. It
   finds that there are both qualitative and quantitative differences
   from the environment described in RFC3552 and is intended as input
   to the IAB program on the Internet threat model started in 2020.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mcfadden-smart-threat-changes-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-ns-impact">
          <front>
            <title>Impact of TLS 1.3 to Operational Network Security Practices</title>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Eric Wang" initials="E." surname="Wang">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Roman Danyliw" initials="R." surname="Danyliw">
              <organization>Software Engineering Institute</organization>
            </author>
            <author fullname="Roelof DuToit" initials="R." surname="DuToit">
              <organization>Broadcom</organization>
            </author>
            <date day="26" month="January" year="2021"/>
            <abstract>
              <t>   Network-based security solutions are used by enterprises, the public
   sector, internet-service providers, and cloud-service providers to
   both complement and enhance host-based security solutions.  As TLS is
   a widely deployed protocol to secure communication, these network-
   based security solutions must necessarily interact with it.  This
   document describes this interaction for current operational security
   practices and notes the impact of TLS 1.3 on them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ns-impact-04"/>
        </reference>
        <reference anchor="I-D.draft-taddei-smart-cless-introduction">
          <front>
            <title>Capabilities and Limitations of an Endpoint-only Security Solution</title>
            <author fullname="Arnaud Taddei" initials="A." surname="Taddei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Candid Wueest" initials="C." surname="Wueest">
              <organization>Acronis</organization>
            </author>
            <author fullname="Kevin A. Roundy" initials="K. A." surname="Roundy">
              <organization>Norton Lifelock</organization>
            </author>
            <author fullname="Dominique Lazanski" initials="D." surname="Lazanski">
              <organization>Last Press Label</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   In the context of existing, proposed and newly published protocols,
   this draft RFC is to establish the capabilities and limitations of
   endpoint-only security solutions and explore benefits and
   alternatives to mitigate those limits with the support of real case
   studies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-taddei-smart-cless-introduction-03"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="E." surname="Chien" fullname="Eric Chien">
        <organization>Broadcom</organization>
        <address>
          <email>Eric.Chien@broadcom.com</email>
          <uri>https://www.linkedin.com/in/eric-chien-66b4b258/</uri>
        </address>
      </contact>
      <t>Eric contributed to the analysis of the Man in the Browser attacks.</t>
      <contact initials="G." surname="Scalone" fullname="Gianpaolo Scalone">
        <organization>Vodafone</organization>
        <address>
          <email>gianpaolo-angelo.scalone@vodafone.com</email>
          <uri>https://www.linkedin.com/in/gianpaoloscalone/</uri>
        </address>
      </contact>
      <t>Contributed the research on the conflicts of ECH with local legislations to block.</t>
      <contact initials="D." surname="Engberg" fullname="Daniel Engberg">
        <organization>Skandinaviska Enskilda Banken AB (SEB)</organization>
        <address>
          <email>daniel.engberg@seb.se</email>
          <uri>https://www.linkedin.com/in/daniel-engberg-1561aaa/</uri>
        </address>
      </contact>
      <t>Validate the issues for his organization.</t>
      <contact initials="C." surname="Leroy" fullname="Celine Leroy">
        <organization>Eight Advisory</organization>
        <address>
          <email>celine.leroy@8advisory.com</email>
          <uri>https://www.linkedin.com/in/celine-leroy-1a534252/</uri>
        </address>
      </contact>
      <t>Thank you to Céline for her work on cybersecurity financial impacts on enterprises.</t>
      <contact initials="D." surname="Engberg" fullname="Daniel Engberg">
        <organization>Skandinaviska Enskilda Banken AB (SEB)</organization>
        <address>
          <email>daniel.engberg@seb.se</email>
          <uri>https://www.linkedin.com/in/daniel-engberg-1561aaa/</uri>
        </address>
      </contact>
      <t>Validate the issues for his organization.</t>
      <contact initials="G." surname="Tavano" fullname="Gianpiero Tavano">
        <organization>Broadcom</organization>
        <address>
          <email>Gianpiero.Tavano@broadcom.com</email>
          <uri>https://www.linkedin.com/in/gianpiero-tavano-5b975383/</uri>
        </address>
      </contact>
      <t>Review the text, provided feedback and reminded us on the budgetary issues</t>
      <contact initials="R." surname="duToit" fullname="Roelof duToit">
        <organization>Broadcom</organization>
        <address>
          <email>roelof.dutoit@broadcom.com</email>
          <uri>https://www.linkedin.com/in/roelof-du-toit-a66831/</uri>
        </address>
      </contact>
      <t>Roelof contributed many things including research, former I-D, text, the newly setup github, etc.</t>
      <contact initials="D." surname="Lopez" fullname="Diego Lopez">
        <organization>Telefonica</organization>
        <address>
          <email>diego.r.lopez@telefonica.com</email>
          <uri>https://www.linkedin.com/in/dr2lopez/</uri>
        </address>
      </contact>
      <t>Diego contributed in several aspects including MCPs.</t>
      <contact initials="G." surname="Tomic" fullname="Gary Tomic">
        <organization>Broadcom</organization>
        <address>
          <email>gary.tomic@broadcom.com</email>
          <uri>https://www.linkedin.com/in/garytomic/</uri>
        </address>
      </contact>
      <t>Gary contributed many things including research, keep us on scope, critique for when issues where not impacted by ECH as we initially thought.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
