Based on Recommendations
in the original research:
https://www.openssl.org/~bodo/ssl-poodle.pdf
If man-in-the-middle (MITM) intercepts communication, assuming client's "Hello" with ciphers propagates in clear, what would preclude MITM from removing TLS_FALLBACK_SCSV flag during downgrade dance (thus rendering the mechanism proposed inefficient)?
It is not fully efficient anyway (since existing SSL3.0 browsers would be affected - otherwise its support could be fully removed on server side): just in the light of Chrome promotion under TLS_FALLBACK_SCSV pretext...