Conversation

Replying to and
ESNI was replaced by Encrypted Client Hello (ECH). It relies on the new HTTPS record type which isn't broadly supported yet. It shouldn't end up being that hard to deploy but software largely doesn't support it yet. It's still somewhat useful even without a shared server IP.
2
1
Replying to and
My solution in this space of "my browser works properly with walled garden services" also solves for, in some cases, non-walled services, wherein the same endpoint that handles the acme challenge forwarding also has a path the drops out to splice(2) after initial routing
1
Replying to and
It's this spliced part that I think will be most affected, but I'm also not yet sure (haven't read enough, which is most of why I'm afraid it'll make a mess), if it's also going to make the acme dance indirection harder
1
Replying to and
Nothing really seems to implement ECH yet and the only place that I've seen explicit HTTPS record support is Cloudflare's DNS. At this point, it's not really something that's actually available for use unless you implement it yourself. It definitely won't be commonly used anyway.
1
Replying to and
Main purpose of it is to declare HTTP/3 support for the first connection and the ECH key. It also acts like HSTS which I guess could be useful for clients without the Chromium HSTS preload list which do have DNSSEC + HTTPS record support, or for fresh domains not preloaded yet.
1
1