|
22 | 22 | # true or false |
23 | 23 | CNAMEdeepInspect = true |
24 | 24 |
|
25 | | - # Should _esni. subdomains be blocked by default? Encrypted Server Name Indication |
26 | | - # (ESNI) is certainly a good step into the right direction to enhance privacy on the |
27 | | - # web. It prevents on-path observers, including ISPs, coffee shop owners and |
28 | | - # firewalls, from intercepting the TLS Server Name Indication (SNI) extension by |
29 | | - # encrypting it. This prevents the SNI from being used to determine which websites |
30 | | - # users are visiting. |
| 25 | + # Should _esni. subdomains of blocked domains also be blocked by default? Encrypted |
| 26 | + # Server Name Indication (ESNI) is certainly a good step into the right direction to |
| 27 | + # enhance privacy on the web. It prevents on-path observers, including ISPs, coffee |
| 28 | + # shop owners and firewalls, from intercepting the TLS Server Name Indication (SNI) |
| 29 | + # extension by encrypting it. This prevents the SNI from being used to determine which |
| 30 | + # websites users are visiting. |
31 | 31 | # |
32 | 32 | # ESNI will obviously cause issues for pixelserv-tls which will be unable to generate |
33 | | - # matching certificates on-the-fly when it cannot read the SNI. Cloudflare and Firefox |
34 | | - # are already enabling ESNI. According to the IETF draft (link above), we can easily |
35 | | - # restore pixelserv-tls's operation by replying NXDOMAIN to _esni. subdomains of |
36 | | - # blocked domains as this mimics a "not configured for this domain" behavior. |
| 33 | + # matching certificates on-the-fly when it cannot read the SNI. According to the IETF |
| 34 | + # draft (link above), we can easily restore pixelserv-tls's operation by replying |
| 35 | + # NXDOMAIN to _esni. subdomains of blocked domains as this mimics a "not configured |
| 36 | + # for this domain" behavior. |
| 37 | + # |
| 38 | + # ESNI is mostly obsolete. It was previously rolled out by Cloudflare and Firefox, but |
| 39 | + # they, as well as almost every client and server, are now using Encrypted Client |
| 40 | + # Hello (ECH) instead of ESNI. ECH is served via the HTTPS record on the same RRname, |
| 41 | + # so it will automatically be blocked. |
37 | 42 | # |
38 | 43 | # Allowed values are: |
39 | 44 | # true or false |
|
0 commit comments