Encrypted ClientHello (ECH) Rollout Playbook

2026-03-27 · software

Encrypted ClientHello (ECH) Rollout Playbook

Date: 2026-03-27
Category: knowledge
Audience: Platform / security / SRE teams operating TLS termination and DNS

1) Why ECH matters now

TLS 1.3 encrypts most handshake metadata, but classic Server Name Indication (SNI) still exposed the destination hostname to on-path observers.

ECH (Encrypted ClientHello) closes that gap by encrypting the sensitive portion of ClientHello. In 2026, ECH is no longer just a draft-era experiment:

That shifts ECH from “future privacy feature” to an operational migration topic.


2) Correct mental model (what ECH does and does not do)

What ECH protects

ECH protects sensitive handshake fields (especially true target server name) by sending:

What ECH does not magically solve

ECH alone does not hide everything:

So treat ECH as one layer in a privacy stack:


3) Prerequisites checklist

Before enabling ECH broadly, confirm:

The common production pitfall is not cryptography — it is misconfiguration drift across DNS and TLS fleets.


4) Deployment architecture choices

RFC 9849 frames two practical topologies:

  1. Shared mode: client-facing and backend server are the same entity.
  2. Split mode: client-facing server and backend server are separate.

Operationally:

If your edge is distributed, define strict ownership boundaries for:


5) Rollout plan (safe sequence)

Phase 0 — Inventory and blast-radius mapping

For each hostname group:

Phase 1 — Publish but narrow

Phase 2 — Observe acceptance and retry behavior

Track at minimum:

Phase 3 — Expand in cohorts

Expand by cohort, not globally:

Phase 4 — Normalize and rotate

Make ECH key/config rotation part of normal cert/key hygiene (runbook + automation + drills).


6) Enterprise and policy interactions

ECH changes visibility assumptions for networks that depended on plaintext SNI inspection.

Real-world compatibility pattern:

Do not treat this as “broken internet”; treat it as policy boundary negotiation. Publish explicit customer guidance for enterprise admins.


7) Failure modes to plan for

A) DNS/TLS split-brain

Symptoms:

Cause:

B) Partial fleet readiness

Symptoms:

Cause:

C) Middlebox interference

Symptoms:

Cause:

Runbook principle: rapid DNS rollback + scoped disable switches + ASN-level diagnostics.


8) Minimal observability schema

For each TLS connection (sampled if needed), capture:

Alert on:


9) Practical guidance for teams adopting now

ECH is best viewed as privacy hardening with operational discipline, not a one-click feature flag.


References

  1. RFC 9849 — TLS Encrypted Client Hello
    https://datatracker.ietf.org/doc/rfc9849/
  2. RFC 9848 — Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings
    https://datatracker.ietf.org/doc/rfc9848/
  3. RFC 9460 — SVCB and HTTPS DNS Resource Records
    https://datatracker.ietf.org/doc/rfc9460/
  4. Cloudflare Docs — ECH Protocol
    https://developers.cloudflare.com/ssl/edge-certificates/ech/
  5. Mozilla Support — Encrypted Client Hello (ECH) FAQ
    https://support.mozilla.org/en-US/kb/faq-encrypted-client-hello