Hacker News new | past | comments | ask | show | jobs | submit login

As far as I know, the SNI field is only used by the server to select what cert to use and site to serve. So if someone were to MitM the SNI exchange, presuming they don't have a valid cert, they could only cause the client to receive a different site (if served with a cert valid for both sites). We can presume the MitM doesn't have a valid cert, otherwise they could fully MitM the connection.

To ensure your keys are indeed set up by the trusted party, you need to get that signed by the server cert, but that is already part of the TLS protocol. It seems I'm missing something.




The danger is not that unencrypted SNI exposes clients to additional MitM attacks. It just exposes the client's intended domain to everyone on the connection route. It's an information leak, that's all.


I think OP I replied to stated that encrypting SNI requires MitM mitigations.


Everyone on the connection route would be “in the middle”. The actors to watch out for are ISPs and CDNs.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: