tivation when pushing for access_administratively_disabled.
> IOW, if any changes to TLS are warranted based on DNS-based censorship,
> then those are likely more complex than has been seen in this discussion,
> and also aren't things where this list has the right expertise AFAIK.
>
t algorithm specified, I doubt any browser
> would implement this. (And IMO I doubt they will do so anyway.)
>
In the version being discussed it is just another error value.
I think browsers would implement it just like they will implement access_denied.
Greetings,
Mateusz Jończyk
___
W dniu 04.01.2018 o 15:22, Eric Rescorla pisze:
>
>
> On Thu, Jan 4, 2018 at 2:46 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote:
>
> W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze:
> > On 01/03/2018 10:17 AM, Mateusz Jończyk wrote:
> >&
>
Yes, at least in corporate environments, parental control solutions, etc.
This will give a more understandable message to the user.
Greetings,
Mateusz Jończyk
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
W dniu 04.01.2018 o 11:46, Mateusz Jończyk pisze:
> W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze:
>> On 01/03/2018 10:17 AM, Mateusz Jończyk wrote:
>>> Judging from TLS1.3's problems with middleboxes, content filtering isn't so
>>> rare, especially in the
W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze:
> On 01/03/2018 10:17 AM, Mateusz Jończyk wrote:
>> Judging from TLS1.3's problems with middleboxes, content filtering isn't so
>> rare, especially in the corporate world.
>>
>> The provider of filtering servi
g25226.html
>
>> On Jan 3, 2018, at 7:48 AM, Mateusz Jończyk wrote:
>>
>> Hello,
>> Based on Your feedback (for which I am grateful) I have designed a new
>> version
>> of the access_administratively_disabled mechanism.
>>
>> 1. One new AlertDescr
W dniu 03.01.2018 o 17:31, Eric Rescorla pisze:
>
>
> On Wed, Jan 3, 2018 at 8:17 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote:
>
> W dniu 03.01.2018 o 16:28, Eric Rescorla pisze:
> > Well, this seems like the first arm, in which you
W dniu 03.01.2018 o 16:28, Eric Rescorla pisze:
>
>
> On Wed, Jan 3, 2018 at 6:45 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote:
>
> W dniu 03.01.2018 o 14:19, Eric Rescorla pisze:
> > I have several comments:
> >
> > - This i
vely_disabled.net servers. For example, Microsoft is
providing their own filtering solution (which is called Microsoft Forefront
Threat Management Gateway) [1] and it could deploy one
access_administratively_disabled.net server globally.
[1] http://msdn.microsoft.com/en-us/library/ff827462(v=vs.85).
://access_administratively_disabled.net service for the public internet.
This mechanism would provide blocking transparency without affecting security.
Greetings,
Mateusz Jończyk
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
CCing Ted Lemon as the author of previous proposition.
W dniu 02.01.2018 o 21:20, Eric Rescorla pisze:
> On Tue, Jan 2, 2018 at 12:08 PM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote:
>
> Then the browser should display a message inside the warning screen that
s/current/msg20276.html>
> Standardizing and implementing things like this signals, politically, that we
> accept and even encourage censorship like we see in China and many other
> places already in the world. That, on its own, makes this a non-starter.
If so, then the document should
message for any odd characters, invalid UTF-8 sequences, etc. as will
be specified in the standard.
Greetings,
Mateusz Jończyk
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
14 matches
Mail list logo