diff options
author | Nardi Ivan <nardi.ivan@gmail.com> | 2020-08-05 17:13:23 +0200 |
---|---|---|
committer | Nardi Ivan <nardi.ivan@gmail.com> | 2020-08-05 17:13:23 +0200 |
commit | 79b89d286605635f15edfe3c21297aaa3b5f3acf (patch) | |
tree | e5640eed13e298de4d3ecbaf66587ac61cacdd80 /configure.seed | |
parent | 07d9fa7f96d50aea4a1d8ed40330afa7d4944151 (diff) |
Add risk flag about suspicious ESNI usage
In a Client Hello, the presence of both SNI and ESNI may obfuscate the real
domain of an HTTPS connection, fooling DPI engines and firewalls, similarly
to Domain Fronting.
Such technique is reported in a presentation at DEF CON 28:
"Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade
censors, bypass network defenses, and blend in with the noise"
Full credit for the idea must go the original author
At the moment, the only way to get the pdf presention and related video is via
https://forum.defcon.org/node/234492
Hopefully a direct link (and an example pcap) will be available soon
Diffstat (limited to 'configure.seed')
0 files changed, 0 insertions, 0 deletions