buh@lemmy.world to Firefox@lemmy.ml · 2 years agoSay (an encrypted) hello to a more private internet.blog.mozilla.orgexternal-linkmessage-square64linkfedilinkarrow-up1643arrow-down17cross-posted to: [email protected][email protected]privacy[email protected]
arrow-up1636arrow-down1external-linkSay (an encrypted) hello to a more private internet.blog.mozilla.orgbuh@lemmy.world to Firefox@lemmy.ml · 2 years agomessage-square64linkfedilinkcross-posted to: [email protected][email protected]privacy[email protected]
minus-squarepazukaza@lemmy.mllinkfedilinkarrow-up1·2 years agoWouldn’t it be better if reverse proxies simply had a “default key” meant to encrypt the SNI after an unencrypted “hello” is received? Including DNS in this seems weird.
minus-squarep1mrx@sh.itjust.workslinkfedilinkarrow-up1·2 years agoWhat would stop a MITM attacker from replacing the key? The server can’t sign the key if it doesn’t know which domain the client is trusting.
Wouldn’t it be better if reverse proxies simply had a “default key” meant to encrypt the SNI after an unencrypted “hello” is received?
Including DNS in this seems weird.
What would stop a MITM attacker from replacing the key? The server can’t sign the key if it doesn’t know which domain the client is trusting.