On Mon, Sep 24, 2018, 12:46 PM Nathaniel Suchy <m...@lunorian.is> wrote:

> Hi everyone,
>
> Cloudflare has added support to TLS 1.3 for encrypted server name
> indication (SNI). This mailing list post is a high level overview of how
> meek could take advantage of this in relation to Cloudflare who until just
> now wasn’t an option for domain fronting.
>
> What this means:
> Effectively domain fronting works by sending a different SNI and host
> header. CDN providers like Cloudflare started double checking to make
> governments happy, scratch that line, I mean to protect their customers
> from fraud and abuse. They seem to of backtracked now. Encrypted SNI means
> that a firewall or coffee shop owner won’t be able to use SNI to see the
> real origin of TLS traffic.
>
> Why this matters:
> With the right adjustments for TLS 1.3 and Encrypted SNI support,
> Cloudflare may be a viable option for Meek.
>
> Risks:
> * Firewall products could always use DPI and block TLS 1.3 altogether.
> * Firewall products could block all requests with encrypted SNI.
>
> Thoughts anyone?
>

The latter concern seems real enough for me that we should consider not
front-running major adoption in browsers.

-tom

>
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to