top | item 35411207

(no title)

eNV25 | 2 years ago

This reminds me of secondary school, where the IT guy blocked UDP completely. WireGuard didn't work, HTTP3/QUIC didn't work, network time didn't work, and probably a bunch of other stuff.

discuss

order

ocdtrekkie|2 years ago

This is perfectly reasonable if you provide internal network time, and you don't want people using your network for illegal activity. At work we don't block "all UDP", but we block anything QUIC, anything classified as a VPN or proxy, and anything like DoH which is intended to obscure visibility into network usage.

Organizations who are not doing this are not adequately managing their network.

srj|2 years ago

Isn't it kind of creepy that you manage which websites people can visit and spy on their usage? I disagree that this is needed for "adequately managing their network."

yencabulator|2 years ago

What's the point of blocking QUIC but not TCP port 443?