Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's indeed pretty simple for TLS over TCP, since the whole ClientHello is part of the first packet and relatively easy parse or seek for. With QUIC it becomes a major pain, since it's not obvious anymore for middleboxes which QUIC packet is the first in a connection, and since Crypto data can be fragmented and reordered (Chrome is doing that by purpose even inside single packets). Therefore hardware inspection would require a pretty full-featured QUIC protocol parser and understanding.


It's easier to just block QUIC. (And UDP in general, might as well)


Interesting, thanks for the insight.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: