On Mon, Aug 10, 2020 at 10:33 PM Peter Gutmann <pgut...@cs.auckland.ac.nz>
wrote:

> Christian Huitema <huit...@huitema.net> writes:
>
> >Fingerprinting is a real issue but from the reports, this is not what is
> >happening here.
>
> Sure, I was just pointing out that they're using the brute-force approach
> now
> but presumably at some point will stop blocking when they've implemented a
> way
> to bypass it.  My guess is that since the GFW uses blocklisting (of known
> sites/pages) all they'll need to do is fingerprint the sites they want to
> block and take it from there.
>

Do you think this fingerprinting will work with the newer ECH design, if
the client can add arbitrary content to the encrypted payload?

Another technique to use here: deploy servers that refuse unencrypted
ClientHello messages.

thanks,
Rob
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to