https - hopefully not too stupid a question
Peter Fairbrother
zenadsl6186 at zen.co.uk
Sun Jun 17 18:59:15 BST 2012
Chris Edwards wrote:
> On Sun, 17 Jun 2012, Francis Davey wrote:
>
>> That is very interesting. Does that mean that s97A (anti-copyright
>> infringement) ordered blocks could be required to block a particular
>> hostname without having to look inside the http packet, but merely at
>> the TLS client HELLO (or does that count as DPI - I'm never sure what
>> counts as "deep")?
>
> I'm not sure what counted as "deep" either, but this new bill seems to be
> changing things, such that you intercept content using DPI kit to extract
> certain info, which is then deemed mere "traffic data". Sniffing the
> URL hostname from the a TLS connection would probably count as an example
> of this.
Probably OK under the present RIPA regime too.
>
> Although most current browsers do SNI, not all do. Because of this, the
> majority of web hosters still use a unique IP address for every https
> website, just like they always did. So in most (current) cases, blocking
> an https site by IP address would not result in overblocking.
>
> That might change in future if web hosts start putting multiple websites
> on a single IP (and using the SNI in anger). So any web-blocking system
> would need to examine the SNI, and I'm not sure if such kit exists
> (today).
With the introduction of IPv6 any pressure to share IPs will most likely
go away, and I suspect SNI will never really get used in anger.
In fact it might be a good idea to deprecate it, starting sooner rather
than later. Hmm, is it easy to switch off in ordinary browsers?
Not that it's that much of a security risk, just that it's a
not-very-good idea whose only function is to overcome a now-vanishing
problem.
-- Peter Fairbrother
>
>
>
More information about the ukcrypto
mailing list