this post was submitted on 10 Apr 2024
517 points (98.0% liked)

Technology

59674 readers
4464 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 7 months ago (1 children)

As I I have previously mentioned, if you are encapsulating all traffic in an encrypted tunnel, then most of the data would have two layers of encryption. This can be detected, and, in fact is being detected in China and, experimentally, in Russia.

Please explain how are you imagining that.

because double layer of encryption can be detected and your beautiful website does not need encryption-on-top-of-encryption. It is obvious that you are reaching something else.

I think I've mentioned before one solution of having a constant amount of data transferred.

What I understood from you is that you are talking about encapsulating TLS-encripted traffic in https, TLS-encripting it again.

I meant L3 encapsulated in HTTPS.

[–] [email protected] 1 points 7 months ago* (last edited 7 months ago) (1 children)

Please explain how are you imagining that

I do not have right now links to articles about that exactly, but here is an old article about somewhat similar tactics that China uses to block encrypted proxy protocols like shadowsocks, for example: https://gfw.report/publications/usenixsecurity23/en/

[–] [email protected] 1 points 7 months ago (1 children)

I've read the article and really liked it, but it doesn't say anything about TLS inside TLS.

[–] [email protected] 1 points 7 months ago* (last edited 7 months ago) (1 children)

As I said earlier, it is only somewhat similar to TLS-in-TLS blocking. I do not have exact articles right now, and it is not easy to google them, since almost all of them are in Chinese.

But here is for example, a proof of concept of a tool, that detects TLS-in-TLS: https://github.com/XTLS/Trojan-killer

It is incomplete and I do not know if it uses the same methods as Chinese censors, but it still proves the possibility.

If you still require more concrete proff, then, I will try to find an article in my free time and if I do, I would reply to your comment again after that (it is not going to be in the nearest future.

[–] [email protected] 1 points 7 months ago

OK, I've looked at this thing and read about it. It can be real. It should be solved by what I said earlier, but apparently in real life they solve it a bit more efficiently.

Didn't check.