Scope

This report mainly focuses on

  • problems with deploying ECH and how to adress these,
  • sources of misconfigurations
  • implications of deploying ECH (assessing subsequent risks)
  • attacks against ECH enabled servers
  • possibilities for censorship or denial of service
  • the interface layers between protocols which play together to make ECH possible

None-scope

The report does NOT try to

  • analyse if the used cryptographic libraries, primitives or algorithms are safe (or quantum resistant)
  • prove the security of individual implementations (or the lack of, by breaking or analysing concrete implementations)