[{"author": "Anthony Somerset", "text": "

slightly loud online

", "time": "2023-03-30T06:00:14Z"}, {"author": "Kirsty Paine", "text": "

Join me on minute taking: https://notes.ietf.org/notes-ietf-116-opsec

", "time": "2023-03-30T06:08:31Z"}, {"author": "Warren Kumari", "text": "

@Anthony: Yup, but some people like being loud - e.g Randy and Jen. :-P

", "time": "2023-03-30T06:08:42Z"}, {"author": "Warren Kumari", "text": "

Oh, and me, but I do it by just being fabulous, instead of having to rely on a font choice...

", "time": "2023-03-30T06:09:18Z"}, {"author": "Jen Linkova", "text": "

It has been working for me so far, so..;))

", "time": "2023-03-30T06:09:20Z"}, {"author": "Warren Kumari", "text": "

Yup. People who cannot be as fabulous and modest as me (AKA, everyone) have to rely on other solutions... :-)

", "time": "2023-03-30T06:10:29Z"}, {"author": "Jen Linkova", "text": "

Fortunately there is Comic Sans to rescue

", "time": "2023-03-30T06:11:09Z"}, {"author": "Anthony Somerset", "text": "

i thought tunnelbroker shutdown?

", "time": "2023-03-30T06:13:13Z"}, {"author": "Anthony Somerset", "text": "

it seems not

", "time": "2023-03-30T06:13:47Z"}, {"author": "\u677e\u672c \u62d3\u4e5f", "text": "

Is there a firewall that work with dynamic block-list for IPv6?

", "time": "2023-03-30T06:32:19Z"}, {"author": "Mingxing Liu", "text": "

emmm, source address validation can support a dynamic block-list for source IPv6 or IPv4 address

", "time": "2023-03-30T06:34:28Z"}, {"author": "Anthony Somerset", "text": "

define \"dynamic\"

\n

i deploy netgate pfsense based FW's and it can support \"dynamically\" downloading lists for firewall rules which could be ipv6 addresses

", "time": "2023-03-30T06:34:32Z"}, {"author": "Daniel Gillmor", "text": "

+1 to Chris Wood's comment: we should absolutely be discouraging use of network addresses for these purposes

", "time": "2023-03-30T06:35:42Z"}, {"author": "Daniel Gillmor", "text": "

blocking IoT by IP address assumes that each device won't try to just use a different IP address

", "time": "2023-03-30T06:36:29Z"}, {"author": "\u677e\u672c \u62d3\u4e5f", "text": "

Thx for the info, I mean dynamic in Slide14 which update the ACL lifetime periodically. I'll check.

", "time": "2023-03-30T06:37:29Z"}, {"author": "Anthony Somerset", "text": "

well done!

", "time": "2023-03-30T06:41:39Z"}, {"author": "Anthony Somerset", "text": "

Meetecho need a cam move please :)

", "time": "2023-03-30T06:41:52Z"}, {"author": "Daniel Gillmor", "text": "

slide 6 of @Andrew Campling 's slides appears to suggest that use of SNI for filtering is mandatory in schools, but that is not the case.

", "time": "2023-03-30T06:51:35Z"}, {"author": "Anthony Somerset", "text": "

i've not been in the UK for quite some time but i vaguely recall that internet was largely provided by local authority and filtering done at the local authority level

\n

and last i recall it was fundamentally SSL proxy/transparent proxy based

", "time": "2023-03-30T06:52:26Z"}, {"author": "Daniel Gillmor", "text": "

even where filtering regimes are mandatory for schools, i'm unaware of any such regime that mandates the use of SNI

", "time": "2023-03-30T06:52:31Z"}, {"author": "Anthony Somerset", "text": "

@Daniel Gillmor they don't mandate SNI, they mandate that web content filtering takes place

", "time": "2023-03-30T06:53:01Z"}, {"author": "Anthony Somerset", "text": "

they don't mandate the technology

", "time": "2023-03-30T06:53:10Z"}, {"author": "Daniel Gillmor", "text": "

right, i'm objecting to the slide which seems to claim otherwise

", "time": "2023-03-30T06:53:19Z"}, {"author": "Anthony Somerset", "text": "

i posit that https://www.rfc-editor.org/rfc/rfc8914.html with DNS based filtering is a more than adequate substitute for SNI based inspection in most cases

", "time": "2023-03-30T06:54:19Z"}, {"author": "Anthony Somerset", "text": "

also - SNI, does not handle the simple matter of URL filtering, only domains

", "time": "2023-03-30T06:57:18Z"}, {"author": "Daniel Gillmor", "text": "

so if there is nothing that is reliable, and your legal mandate for filtering demands reliable filtering, you are immediately in violation?

", "time": "2023-03-30T06:58:33Z"}, {"author": "Anthony Somerset", "text": "

the reality is that pretty much the only reliable means is deploying an agent on hosts and does MITM SSL proxy ultimately - i'm over-simplifying

", "time": "2023-03-30T07:00:01Z"}, {"author": "Jen Linkova", "text": "

[no hats] I think the question here: shall the message be \"ECH is scary because it doesn't allow you to use a signal which is already unreliable anyway\"

", "time": "2023-03-30T07:00:01Z"}, {"author": "Dan Sexton", "text": "

SNI can be useful in triaging traffic to decide, in managed environments, which traffic to decrypt (for URL filtering).

", "time": "2023-03-30T07:00:55Z"}, {"author": "Anthony Somerset", "text": "

there is no use case that can only be done via SNI
\nits just that filtering vendors have made business decisions and assumptions of using SNI and are now crying because their software breaks

", "time": "2023-03-30T07:03:05Z"}]