@93068179 I don't think so. This is just to establish a secure TLS connection.
The public key being intercepted in the unencrypted DNS response is not a concern since it's not meant to be a secret.
Now if one is using plain DNS, all the benefits of ECH are nullified: the adversary can just watch DNS traffic, instead of client hello messages, to figure out where the user is going.
@367424eb Intercepted isn't the concern so much as an unencrypted key being MITM'd to an attacker's public key instead. Would at least sniff that info.