Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

China starts blocking HTTPS connections with encrypted SNI: Report

Spread the love

 In an update to its national censorship tool, known as the Great Firewall, China has reportedly started blocking HTTPS connections with Encrypted Server Name Indication.

The ban has been in place for over a week now, three organisations tracking Chinese censorship — iYouPort, the University of Maryland, and the Great Firewall Report – said this week in a joint report.

“We confirm that the Great Firewall (GFW) of China has recently begun blocking ESNI – one of the foundational features of TLS 1.3 and HTTPS,” said the report.

TLS is the foundation of secure communication on the web (HTTPS). It provides authenticated encryption so that users can know whom they are communicating with. It also ensures that an intermediary does not read or tamper with your information.

But even though TLS hides the content of a user’s communication, it does not always conceal with whom the user is communicating.

The TLS handshake (a process that kicks off a communication session) optionally contains a Server Name Indication (SNI) field that allows the user’s client to inform the server which website it wishes to communicate with.

Nation-state censors have used the SNI field to block users from being able to communicate with certain destinations, said that report, adding that China has long been censoring HTTPS in this manner.

TLS 1.3 introduced Encrypted SNI (ESNI) that encrypts the SNI so that intermediaries cannot view it, said the report.

The Great Firewall of China blocks ESNI connections by dropping packets from client to server, it added.

Advertisement
Advertisement

Leave a Comment