Iran blocking essentially all encyrpted protocols
Alan Clegg
alan at clegg.com
Sat Feb 11 22:56:52 UTC 2012
On 2/11/2012 4:50 PM, Richard Barnes wrote:
> FWIW: A colleague in Iran was able to connect to a server in the US
> using HTTPS on a non-standard port (9999). It appears that the
> Iranian government is not blocking TLS/HTTPS per se, but just port
> 443. So in principle, if there were just some HTTPS proxies using
> non-standard ports, then people would be able to get out. At least
> until (1) the addresses of the proxies become known to the regime, or
> (2) they start blocking cross-border TLS altogether.
Or applications (and providers) knew how to use SRV records...
AlanC
--
alan at clegg.com | 1.919.355.8851
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 260 bytes
Desc: OpenPGP digital signature
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20120211/900bae32/attachment.sig>
More information about the NANOG
mailing list