troet.cafe ist Teil eines dezentralisierten sozialen Netzwerks, angetrieben von Mastodon.
Hallo im troet.cafe! Dies ist die derzeit größte deutschsprachige Mastodon Instanz zum tröten, neue Leute kennenlernen, sich auszutauschen und Spaß zu haben.

Verwaltet von:

Serverstatistik:

7 Tsd.
aktive Profile

Mehr erfahren

#ech

0 Beiträge0 Beteiligte0 Beiträge heute

🌩️ Cloudflare Asks Court to End LaLiga's "Illegal" Blocking Response to Encrypted Client Hello *
—TorrentFreak

「 The unusual feature of the complaint is the focus on Encrypted Client Hello, or ECH for short. As highlighted earlier, this can effectively be used to bypass site blocking 」

torrentfreak.com/cloudflare-as

torrentfreak.comCloudflare Asks Court to End LaLiga's "Illegal" Blocking Response to Encrypted Client Hello * TorrentFreakCloudflare has asked a Spanish court to declare LaLiga's “disproportionate” piracy blocking measures illegal.
#cloudflare#ech#copyright

I just noticed that my #Firefox was sending network traffic either with HTTP/2 + #ECH + #X25519MLKEM768, or with HTTP/3, but without ECH or X25519MLKEM768. Then I dug into about:config and found the option network.http.http3.enable_kyber, enabling it fixed the above behavior. HTTP/3 + ECH + X25519MLKEM768 is now used. Maybe check your Firefox behavior to ensure ECH and post-quantum key exchange is used whenever possible. Test site: https://cloudflare-ech.com/cdn-cgi/trace

Looks like Russia is now blocking Cloudflare's Encrypted Client Hello traffic if:
- SNI is cloudflare-ech.com
- TLS ClientHelloOuter contains the "encrypted_client_hello" extension

github.com/net4people/bbs/issu

Russia officially recommends "owners of information resources disable the TLS ECH extension or, more correctly, use domestic CDN services".

cmu.gov.ru/ru/news/2024/11/07/

With increased ECH use, I expect certain other actors to follow suit.

GitHubBlocking of Cloudflare ECH in Russia, 2024-11-05 · Issue #417 · net4people/bbsVon wkrp

tldr: they are using dns poisoning and rejecting TLS sessions based on unencrypted host field in the TLS Client Hello message. We need some Encrypted Client Hello (ECH) going on here...

"Russia blocked OONI Explorer, a large open dataset on Internet censorship"

ooni.org/post/2024-russia-bloc

ooni.org · Russia blocked OONI Explorer, a large open dataset on Internet censorshipThis report documents the blocking of OONI Explorer in Russia based on OONI data.
Cloudflare finally re-enabled #ECH Encrypted ClientHello to protect user privacy a bit more. All free accounts have it enabled without choice, all other account types have to manually enable it.
As one might have guessed, Cloudflare reverted their rollout last year because issues in some corner cases and maybe also TLS-intercepting proxies were found. But at last it was re-enabled.

(Zstd support and HTTP/3 improvements are also good and nice)

https://blog.cloudflare.com/new-standards/
The Cloudflare Blog · New standards for a faster and more private InternetCloudflare's customers can now take advantage of Zstandard (zstd) compression, offering 42% faster compression than Brotli and 11.3% more efficiency than GZIP. We're further optimizing performance for our customers with HTTP/3 prioritization and BBR congestion control, and enhancing privacy through Encrypted Client Hello (ECH).