| Internet-Draft | CFR Source Privacy | March 2026 |
| Scalone | Expires 3 September 2026 | [Page] |
Encrypted Client Hello (ECH) improves destination privacy by encrypting
the Server Name Indication in TLS, but the customer source identity--
typically the IP address and network metadata--remains observable to
intermediaries such as CDNs, hosting providers, and recursive resolvers.
This document introduces the Customer-Facing Relay (CFR), a
lightweight, transport-agnostic relay operated by access providers
to decouple customer identity from encrypted destinations.
By forwarding opaque encrypted payloads (TCP or UDP)
without terminating TLS or QUIC, a CFR complements ECH
encryption to strengthen source privacy and reduce metadata correlation.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 3 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
While recent advances such as TLS 1.3 and ECH significantly improve destination privacy, they do not prevent intermediaries from observing the customer source identity. As content delivery infrastructures concentrate traffic, a small number of entities gain disproportionate visibility over user metadata.¶
The Customer-Facing Relay (CFR) architecture introduces a minimalistic relay positioned at the customers network edge to limit correlation. The CFR rewrites addressing metadata while forwarding encrypted traffic without termination, creating two semi-independent visibility domains: one for the access network (source) and one for the CDN or upstream service (destination). The result is improved source privacy and reduced metadata consolidation.¶
This document refines the CFR concept introduced in draft‑00, elaborates the privacy model, and outlines potential discovery, deployment, and operational considerations.¶
CFR: Customer-Facing Relay, A privacy-enhancing network function positioned at or near the access network. It rewrites source addresses while forwarding encrypted traffic without terminating TLS/QUIC.¶
CFS: Client-Facing Server As defined in ECH (RFC 9460), the endpoint that terminates encrypted handshakes on behalf of origins. A CFR does not act as a CFS.¶
Upstream Service: Upstream Service A CDN, hosting provider, or service endpoint that ultimately receives the relayed encrypted traffic.¶
Opaque Payload: Opaque Payload Encrypted packets (TLS-over-TCP or QUIC-over-UDP) forwarded without modification.¶
CDNs and major hosting platforms increasingly act as aggregation points for encrypted traffic. Even with ECH, these entities can link the customer source IP address to thousands of origins they serve. This centralization poses privacy and competition risks:¶
Correlation risk: Access patterns across different encrypted services can be tied to a single user.¶
Lack of architectural balance: Encryption protects destinations, but source privacy remains under-addressed.¶
Cross-service tracking: Consolidated metadata enables pervasive behavioral observation.¶
CFRs seek to break the direct correlation between the customer and the encrypted destination by splitting visibility:¶
A CFR is a deployable, narrow-function relay implemented by access networks, enterprises, or other operators. Its core behaviors include:¶
| Entity | Knows Source | Knows Destination | Content Visibility |
|---|---|---|---|
| Customer | X | X | X |
| CFR | X | ||
| CDN | X |
No single entity can link source and destination unless collusion or compromise occurs.¶
CFRs enhance privacy but introduce new risks:¶
Further analysis is required to quantify threat models and formal privacy guarantees.¶
This document makes no IANA requests.¶
The author acknowledges the helpful input and discussions from Andrew Campling, Arnaud Taddei, Kevin Smith, Lee Wilman, Tom Newton, and colleagues within Vodafone Group, DINRG, and DISPATCH.¶