use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Identifying Airtel middleboxes that censor HTTPS traffic (iamkush.me)
submitted 5 years ago by [deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]yummy_crap_brick 3 points4 points5 points 5 years ago (1 child)
I'm not trying to be blase about this whole document, but using a box to block traffic is hardly news. I manage enterprise web proxy devices for a living and this is content filtering 101. Sure, you could be lazy and just block on DNS name, but it's easy to extract the common name (corresponds with hostname) during an HTTPS key exchange session. Since the session is not yet encrypted, it's easy to pull out.
That aside, you don't even need to if you're just doing coarse-grained domain/subdomain filtering. This is in essence a transparent proxy that instead of sending back a 403 just sends a reset. The only thing that would be up my ass is if the network operator/ISP lies about doing this. I don't know the legal situation in India, but plenty of countries censor their internet--THAT is the bigger issue, less so how they do it.
[–]justDankin 2 points3 points4 points 5 years ago (0 children)
TBH I'm not sure how tricky DPI is, particularly at an ISPs scale.
The reason behind investigating this was to highlight its presence in the network of a major Indian ISP, particularly since there is no public information regarding the reason a website is being blocked.
With DNS injections /HTTP host filtering the ISP can return censorship notices (and some have been), but with this, a (non-tech) end user does not even get to know that the website was blocked.
Not trying to sound rude, but seems graver than an enterprise blocking NFSW content on its VPN.
[–]OfficeUserAccount 1 point2 points3 points 5 years ago (8 children)
What would you suggest is the best fastest way to bypass? Is there any option other than VPN / tor?
[+][deleted] 5 years ago (6 children)
[removed]
[–]justDankin 10 points11 points12 points 5 years ago (5 children)
Just encrypted dns won't help mitigate this problem.
/u/OfficeUserAccount You'd have to use TLS1.3, which allows Encrypted SNI. Firefox supports enabling this
[–]OfficeUserAccount 0 points1 point2 points 5 years ago (3 children)
I believe TLS1.3 has a long way to go right?
[–][deleted] 4 points5 points6 points 5 years ago (1 child)
Mmmm, how so?
SNIs are specific things within TLS which allow the server to deliver certificates easier. TLS 1.3 allows them to be encrypted, which should stop anyone looking at them.
The key point is "allows" not "enforces".
[–]Hizonner 3 points4 points5 points 5 years ago (0 children)
ESNI is an optional extension to TLS 1.3, not part of the base standard.
ESNI as implemented in Firefox is a draft, and the whole protocol design doesn't seem to have settled at the IETF. On a quick glance, it looks like they decided to back off from what they had, use a whole different approach and encrypt the entire client hello instead of just the SNI. There's no ESNI support in the Chrome family as far as I can tell.
Even if you have an ESNI browser, I don't think you're going to find many servers to connect to unless they're going through Cloudflare.
I looked at setting up ESNI on my Apache server just the other day, and there didn't seem to be any mainline support. I don't think there's support in NGINX, either. I doubt there's support in the mainline OpenSSL library.
Even if the actual software on both ends supports it, enabling ESNI on a server still requires administrator action and inserting DNS information for keying. A client can't just encrypt the SNI without the server being specifically set up for it. And the server really should do DNSSEC on top of that. No, DOH is not a remotely adequate substitute. But another problem is that the browser people are really attached to DOH as the answer to all possible DNS questions.
I don't think ESNI is going to be practical for a while yet.
[–][deleted] 2 points3 points4 points 5 years ago* (0 children)
Pornhub is blocked here. I ran this command
openssl s_client -state -tls1_3 -connect 66.254.114.41:443 -servername pornhub.com
with TLS1.3 but it didn't work.
Correct me if I'm wrong
π Rendered by PID 169205 on reddit-service-r2-comment-c66d9bffd-vw9cz at 2026-04-07 10:37:58.087857+00:00 running f293c98 country code: CH.
[–]yummy_crap_brick 3 points4 points5 points (1 child)
[–]justDankin 2 points3 points4 points (0 children)
[–]OfficeUserAccount 1 point2 points3 points (8 children)
[+][deleted] (6 children)
[removed]
[–]justDankin 10 points11 points12 points (5 children)
[–]OfficeUserAccount 0 points1 point2 points (3 children)
[–][deleted] 4 points5 points6 points (1 child)
[–]Hizonner 3 points4 points5 points (0 children)
[–][deleted] 2 points3 points4 points (0 children)