Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
tivation when pushing for access_administratively_disabled. > IOW, if any changes to TLS are warranted based on DNS-based censorship, > then those are likely more complex than has been seen in this discussion, > and also aren't things where this list has the right expertise AFAIK. >

Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
t algorithm specified, I doubt any browser > would implement this. (And IMO I doubt they will do so anyway.) > In the version being discussed it is just another error value. I think browsers would implement it just like they will implement access_denied. Greetings, Mateusz Jończyk ___

Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
W dniu 04.01.2018 o 15:22, Eric Rescorla pisze: > > > On Thu, Jan 4, 2018 at 2:46 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote: > > W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze: > > On 01/03/2018 10:17 AM, Mateusz Jończyk wrote: > >&

Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
> Yes, at least in corporate environments, parental control solutions, etc. This will give a more understandable message to the user. Greetings, Mateusz Jończyk ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
W dniu 04.01.2018 o 11:46, Mateusz Jończyk pisze: > W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze: >> On 01/03/2018 10:17 AM, Mateusz Jończyk wrote: >>> Judging from TLS1.3's problems with middleboxes, content filtering isn't so >>> rare, especially in the

Re: [TLS] access_administratively_disabled v2

2018-01-04 Thread Mateusz Jończyk
W dniu 03.01.2018 o 18:05, Benjamin Kaduk pisze: > On 01/03/2018 10:17 AM, Mateusz Jończyk wrote: >> Judging from TLS1.3's problems with middleboxes, content filtering isn't so >> rare, especially in the corporate world. >> >> The provider of filtering servi

Re: [TLS] access_administratively_disabled v2

2018-01-03 Thread Mateusz Jończyk
g25226.html > >> On Jan 3, 2018, at 7:48 AM, Mateusz Jończyk wrote: >> >> Hello, >> Based on Your feedback (for which I am grateful) I have designed a new >> version >> of the access_administratively_disabled mechanism. >> >> 1. One new AlertDescr

Re: [TLS] access_administratively_disabled v2

2018-01-03 Thread Mateusz Jończyk
W dniu 03.01.2018 o 17:31, Eric Rescorla pisze: > > > On Wed, Jan 3, 2018 at 8:17 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote: > > W dniu 03.01.2018 o 16:28, Eric Rescorla pisze: > > Well, this seems like the first arm, in which you

Re: [TLS] access_administratively_disabled v2

2018-01-03 Thread Mateusz Jończyk
W dniu 03.01.2018 o 16:28, Eric Rescorla pisze: > > > On Wed, Jan 3, 2018 at 6:45 AM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote: > > W dniu 03.01.2018 o 14:19, Eric Rescorla pisze: > > I have several comments: > > > > - This i

Re: [TLS] access_administratively_disabled v2

2018-01-03 Thread Mateusz Jończyk
vely_disabled.net servers. For example, Microsoft is providing their own filtering solution (which is called Microsoft Forefront Threat Management Gateway) [1] and it could deploy one access_administratively_disabled.net server globally. [1] http://msdn.microsoft.com/en-us/library/ff827462(v=vs.85).

[TLS] access_administratively_disabled v2

2018-01-03 Thread Mateusz Jończyk
://access_administratively_disabled.net service for the public internet. This mechanism would provide blocking transparency without affecting security. Greetings, Mateusz Jończyk ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Captive portals, "access administratively disabled" and alert messages

2018-01-02 Thread Mateusz Jończyk
CCing Ted Lemon as the author of previous proposition. W dniu 02.01.2018 o 21:20, Eric Rescorla pisze: > On Tue, Jan 2, 2018 at 12:08 PM, Mateusz Jończyk <mailto:mat.jonc...@o2.pl>> wrote: > > Then the browser should display a message inside the warning screen that

Re: [TLS] Captive portals, "access administratively disabled" and alert messages

2018-01-02 Thread Mateusz Jończyk
s/current/msg20276.html> > Standardizing and implementing things like this signals, politically, that we > accept and even encourage censorship like we see in China and many other > places already in the world. That, on its own, makes this a non-starter. If so, then the document should

[TLS] Captive portals, "access administratively disabled" and alert messages

2018-01-02 Thread Mateusz Jończyk
message for any odd characters, invalid UTF-8 sequences, etc. as will be specified in the standard. Greetings, Mateusz Jończyk ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls