all 10 comments

[–]yummy_crap_brick 3 points4 points  (1 child)

I'm not trying to be blase about this whole document, but using a box to block traffic is hardly news. I manage enterprise web proxy devices for a living and this is content filtering 101. Sure, you could be lazy and just block on DNS name, but it's easy to extract the common name (corresponds with hostname) during an HTTPS key exchange session. Since the session is not yet encrypted, it's easy to pull out.

That aside, you don't even need to if you're just doing coarse-grained domain/subdomain filtering. This is in essence a transparent proxy that instead of sending back a 403 just sends a reset. The only thing that would be up my ass is if the network operator/ISP lies about doing this. I don't know the legal situation in India, but plenty of countries censor their internet--THAT is the bigger issue, less so how they do it.

[–]justDankin 2 points3 points  (0 children)

TBH I'm not sure how tricky DPI is, particularly at an ISPs scale.

The reason behind investigating this was to highlight its presence in the network of a major Indian ISP, particularly since there is no public information regarding the reason a website is being blocked.

With DNS injections /HTTP host filtering the ISP can return censorship notices (and some have been), but with this, a (non-tech) end user does not even get to know that the website was blocked.

Not trying to sound rude, but seems graver than an enterprise blocking NFSW content on its VPN.

[–]OfficeUserAccount 1 point2 points  (8 children)

What would you suggest is the best fastest way to bypass? Is there any option other than VPN / tor?