(no title)
tscs37
|
7 years ago
This is amazing work, can't wait for this to be finished and deployed on the internet. Together with encrypted DNS (DoT and DoH) we finally get fully confidential connections to a server without leaking anything other than Remote IP.
Ienuur4i|7 years ago
We also need encrypted DNS for the recursive lookup itself so you can run your own resolver somewhere.
tscs37|7 years ago
blattimwind|7 years ago
Why not yourself? Your ISP can still see the RR working, of course.
> We also need encrypted DNS for the recursive lookup itself so you can run your own resolver somewhere.
This would indeed be optimal but would require upgrading a significant portion of authoritative name servers, sooo... might take a while.
pol_throw_away|7 years ago
dogma1138|7 years ago
The encrypted SNI would primarily be useful to make censorship and MITM attacks harder.
rqs|7 years ago
Let's say that I have a Nginx on my server which serves a lot's of websites, and whose web sites can only be accessed through HTTPS with SNI, not HTTP.
Now with Encrypted SNI deployed, requests from my clients can still be dispatched to it's respective virtual hosts, but any sniffers in the middle of the connection should only be able to see that my clients are accessing to my server, but not which virtual host.
Is I'm missed anything? I haven't dig deep in to this currently.
xg15|7 years ago
tscs37|7 years ago
The entire set of encryption can be easily opened up for inspection and manipulation if all parties agree this is good idea.
evfanknitram|7 years ago
bosdev|7 years ago
hansjorg|7 years ago
tscs37|7 years ago
XparentX|7 years ago
[deleted]
marksomnian|7 years ago
If you don't trust your children to use the internet responsibly, don't let them use it. Or let them use it but only under your supervision. If you let them go wild but put up filters, they will find a way around, one way or another, and at that point the princess is in another castle.
SXX|7 years ago