FINDING · DETECTION
Chrome and Firefox send GREASE ECH extensions in every ClientHello message, meaning a censor that blocks all ECH-containing ClientHellos would block all Chrome and Firefox TLS traffic. Cloudflare's static outer SNI "cloudflare-ech.com" in all its ECH configurations makes real ECH connections trivially distinguishable from GREASE ECH — censors can block real ECH connections to Cloudflare without triggering GREASE collateral damage. Cloudflare rejects ECH handshakes with omitted or invalidated outer SNI values; non-Cloudflare ECH deployments accept missing and invalid outer SNIs.
From 2025-niere-encrypted — Encrypted Client Hello (ECH) in Censorship Circumvention · §2.1, §4.1, §6 · 2025 · FOCI 2025 (Free and Open Communications on the Internet)
Implications
- Cloudflare's requirement for a static outer SNI undermines GREASE ECH's collateral- damage protection; ECH providers should allow dynamic or blank outer SNI values so censors cannot distinguish real ECH from GREASE ECH without blocking all TLS.
- Non-Cloudflare ECH deployments that accept missing outer SNI could enable censorship- resistant ECH connections; the anti-censorship community should encourage and test this deployment pattern.
Tags
Extracted by claude-sonnet-4-6 — review before relying.