[149681] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Iran blocking essentially all encyrpted protocols

daemon@ATHENA.MIT.EDU (Alan Clegg)
Sat Feb 11 17:58:00 2012

Date: Sat, 11 Feb 2012 17:56:52 -0500
From: Alan Clegg <alan@clegg.com>
To: nanog@nanog.org
In-Reply-To: <CACB24Ms1afYu-CTXYFw0nQ-yMF2uWvHsKqx9f21gDk5-YY+hiA@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig24EB2B1DE3AF23AB1BA79D5D
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

On 2/11/2012 4:50 PM, Richard Barnes wrote:
> FWIW: A colleague in Iran was able to connect to a server in the US
> using HTTPS on a non-standard port (9999).  It appears that the
> Iranian government is not blocking TLS/HTTPS per se, but just port
> 443.  So in principle, if there were just some HTTPS proxies using
> non-standard ports, then people would be able to get out.  At least
> until (1) the addresses of the proxies become known to the regime, or
> (2) they start blocking cross-border TLS altogether.

Or applications (and providers) knew how to use SRV records...

AlanC
--=20
alan@clegg.com | 1.919.355.8851


--------------enig24EB2B1DE3AF23AB1BA79D5D
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk828jcACgkQcKpYUrUDCYf9YQCeObGvZeZKwA7CgUmKTy8qv4+y
p5cAni09WiUw44sMYudePPnnukCJJdaY
=rTqa
-----END PGP SIGNATURE-----

--------------enig24EB2B1DE3AF23AB1BA79D5D--


home help back first fref pref prev next nref lref last post