<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-scalone-cfr-source-privacy-01" submissionType="IETF" category="info" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true">

<front>
<title abbrev="CFR Source Privacy">Customer-Facing Relay (CFR): Enhancing Source Privacy in Encrypted Transport and CDN Scenarios</title><seriesInfo value="draft-scalone-cfr-source-privacy-01" stream="IETF" status="informational" name="Internet-Draft"></seriesInfo>
<author initials="G." surname="Scalone" fullname="Gianpaolo Angelo Scalone"><organization>Vodafone</organization><address><postal><street></street>
</postal></address></author><date year="2026" month="March" day="2"></date>
<area>Security</area>
<workgroup>DISPATCH</workgroup>

<abstract>
<t>Encrypted Client Hello (ECH) improves destination privacy by encrypting
the Server Name Indication in TLS, but the customer source identity--
typically the IP address and network metadata--remains observable to
intermediaries such as CDNs, hosting providers, and recursive resolvers.
This document introduces the <em>Customer-Facing Relay (CFR)</em>, a
lightweight, transport-agnostic relay operated by access providers
to decouple customer identity from encrypted destinations.<br />
By forwarding opaque encrypted payloads (TCP or UDP)
without terminating TLS or QUIC, a CFR complements ECH
encryption to strengthen source privacy and reduce metadata correlation.</t>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>
<t>While recent advances such as TLS 1.3 and ECH significantly improve destination privacy,
they do not prevent intermediaries from observing the customer source identity.
As content delivery infrastructures concentrate traffic,
a small number of entities gain disproportionate visibility over user metadata.</t>
<t>The Customer-Facing Relay (CFR) architecture introduces a minimalistic relay positioned
at the customers network edge to limit correlation. The CFR rewrites addressing metadata
while forwarding encrypted traffic without termination, creating two semi-independent visibility domains:
one for the access network (source) and one for the CDN or upstream service (destination).
The result is improved source privacy and reduced metadata consolidation.</t>
<t>This document refines the CFR concept introduced in draft‑00, elaborates the privacy model,
and outlines potential discovery, deployment, and operational considerations.</t>
</section>

<section anchor="terminology"><name>Terminology</name>
<t><strong>CFR</strong>: <em>Customer-Facing Relay</em>, A privacy-enhancing network function positioned at or near the access network.
It rewrites source addresses while forwarding encrypted traffic without terminating TLS/QUIC.</t>
<t><strong>CFS</strong>: <em>Client-Facing Server</em> As defined in ECH (RFC 9460), the endpoint that terminates encrypted handshakes on behalf of origins.
A CFR does not act as a CFS.</t>
<t><strong>Upstream Service</strong>: <em>Upstream Service</em> A CDN, hosting provider, or service endpoint that ultimately receives the relayed encrypted traffic.</t>
<t><strong>Opaque Payload</strong>: <em>Opaque Payload</em> Encrypted packets (TLS-over-TCP or QUIC-over-UDP) forwarded without modification.</t>
</section>

<section anchor="motivation"><name>Motivation</name>
<t>CDNs and major hosting platforms increasingly act as aggregation points for encrypted traffic.
Even with ECH, these entities can link the customer source IP address to thousands of origins they serve.
This centralization poses privacy and competition risks:</t>

<ul>
<li><t>Correlation risk: Access patterns across different encrypted services can be tied to a single user.</t>
</li>
<li><t>Lack of architectural balance: Encryption protects destinations, but source privacy remains under-addressed.</t>
</li>
<li><t>Cross-service tracking: Consolidated metadata enables pervasive behavioral observation.</t>
</li>
</ul>
<t>CFRs seek to break the direct correlation between the customer and the encrypted destination by splitting visibility:</t>

<ul spacing="compact">
<li>Customer -&gt; CFR -&gt; CDN -&gt; Origin</li>
</ul>
</section>

<section anchor="customer-facing-relay-cfr-concept"><name>Customer-Facing Relay (CFR) Concept</name>
<t>A CFR is a deployable, narrow-function relay implemented by access networks, enterprises, or other operators. Its core behaviors include:</t>

<section anchor="characteristics"><name>Characteristics</name>

<ul spacing="compact">
<li><strong>Transport-agnostic</strong> - Works for both TCP and UDP encrypted traffic, forwarding opaque   encrypted packets.</li>
<li><strong>No TLS/QUIC termination</strong> - Does not terminate or inspect TLS/QUIC; preserves end-to-end encryption.</li>
<li><strong>Deployable</strong> - Can be operated by access providers and enterprises.</li>
<li><strong>Transparent</strong> - Performs no content filtering, categorization, or  inspection.</li>
<li><strong>Discoverable</strong> - May be discovered via DNS-based mechanisms such as DDR or DNR.</li>
<li><strong>Lightweight operation</strong> - Functions similarly to NAT, NAPT, or tunnel encapsulation, but for privacy purposes.</li>
<li><strong>Policy-minimal</strong> - Not intended for filtering, shaping, categorization, or interception</li>
</ul>
</section>

<section anchor="privacy-model"><name>Privacy Model</name>
<table>
<thead>
<tr>
<th>Entity</th>
<th>Knows Source</th>
<th>Knows Destination</th>
<th>Content Visibility</th>
</tr>
</thead>

<tbody>
<tr>
<td>Customer</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>

<tr>
<td>CFR</td>
<td>X</td>
<td></td>
<td></td>
</tr>

<tr>
<td>CDN</td>
<td></td>
<td>X</td>
<td></td>
</tr>
</tbody>
</table><t>No single entity can link source and destination unless collusion or compromise occurs.</t>
</section>

<section anchor="deployment-models"><name>Deployment Models</name>

<ul spacing="compact">
<li><strong>ISP-embedded CFR</strong> - Integrated in broadband or mobile access gateways.</li>
<li><strong>Enterprise CFR</strong> - For employee source privacy against cloud services.</li>
<li><strong>Federated CFRs</strong> - CFRs operated by third parties, potentially discoverable via DNS.</li>
</ul>
</section>
</section>

<section anchor="relationship-to-existing-work"><name>Relationship to Existing Work</name>

<ul spacing="compact">
<li><strong>ECH (RFC9460)</strong> - Protects destination identity; CFR complements it by protecting source identity.</li>
<li><strong>DPRIVE (DoH/DoT/DoQ)</strong> - Encrypts DNS traffic; CFR addresses the transport-layer metadata.</li>
<li><strong>PEARG / HRPC</strong> - Explore broader issues of privacy and decentralization in Internet architecture.</li>
</ul>
</section>

<section anchor="design-considerations-and-open-questions"><name>Design Considerations and Open Questions</name>

<section anchor="discovery-and-bootstrapping"><name>Discovery and Bootstrapping</name>

<ul spacing="compact">
<li>Use of DDR/DNR to advertise CFR endpoints.</li>
<li>Trust establishment between customer devices and CFR operators.</li>
</ul>
</section>

<section anchor="performance-and-scalability"><name>Performance and Scalability</name>

<ul spacing="compact">
<li>Relay overhead and impact on latency.</li>
<li>Stateless versus stateful design parameters.</li>
</ul>
</section>
</section>

<section anchor="abuse-prevention"><name>Abuse Prevention</name>

<ul spacing="compact">
<li>Preventing use as an open relay.</li>
<li>Integration with Privacy Pass or similar token-based systems.</li>
</ul>
</section>

<section anchor="interoperability"><name>Interoperability</name>

<ul spacing="compact">
<li>Potential chaining of multiple CFRs.</li>
<li>Compatibility with QUIC migration and multipath mechanisms</li>
</ul>
</section>

<section anchor="ietf-standardization"><name>IETF Standardization</name>

<ul spacing="compact">
<li>Target areas include DISPATCH, MASQUE, PEARG, or future CFR-specific working groups</li>
</ul>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>
<t>CFRs enhance privacy but introduce new risks:</t>

<ul spacing="compact">
<li><strong>Collusion risk</strong> - If the CFR and CDN share data, correlation can be restored.</li>
<li><strong>Abuse vectors</strong> - Attackers could abuse CFRs for amplification or anonymization unless constrained.</li>
<li><strong>Operational drift</strong> - CFRs must not evolve into DPI or filtering points; specifications should explicitly prohibit modification or inspection.</li>
<li><strong>Accountability tension</strong> - Some deployments may need soft attribution mechanisms without compromising anonymity.</li>
<li><strong>Need for IPv4/IPv6 NAT randomization standards</strong> - CFR deployments rely on sourc address rewriting, but current NAT behaviors, especially for IPv6 prefix translation and IPv4 port allocation, lack standardized, privacy preserving randomization requirements. A future standard should define deterministic entropy floors for address/port selection, avoid stable mappings, and ensure alignment with the CFR privacy model.</li>
</ul>
<t>Further analysis is required to quantify threat models and formal privacy guarantees.</t>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>This document makes no IANA requests.</t>
</section>

<section anchor="references"><name>References</name>

<section anchor="informative-references"><name>Informative References</name>

<ul spacing="compact">
<li>[RFC9460]  Benjamin L. et al., <em>TLS Encrypted Client Hello</em>, RFC 9460, 2023.<br />
</li>
<li>[RFC9325]  Thomson, M., <em>Recommendations for Secure Use of TLS and DTLS</em>, RFC 9325, 2022.<br />
</li>
<li>[I-D.ietf-add-ddr]  <em>Discovery of Designated Resolvers (DDR)</em>, Internet-Draft, IETF ADD WG.<br />
</li>
<li>[I-D.ietf-add-dnr]  <em>Discovery of Network-designated Resolvers (DNR)</em>, Internet-Draft, IETF ADD WG.</li>
</ul>
</section>
</section>

<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>The author acknowledges the helpful input and discussions from Andrew Campling,
Arnaud Taddei, Kevin Smith, Lee Wilman, Tom Newton,
and colleagues within Vodafone Group, DINRG, and DISPATCH.</t>
</section>

</middle>

<back>

</back>

</rfc>
