Date: 2018-03-26 20:22 (UTC)
fanf: (Default)
From: [personal profile] fanf
I get the impression that the arrow of causation points in the other direction: network device implementers and network operators frequently accidentally mishandle or try to ban traffic that is outside the bounds of what they understand. So, to work around the damage, new stuff has to tunnel through the gaps.

So you get things like mptcp which is carefully designed to make each path look like a single flow, even though the application-level flow is sharded across multiple paths. And TLS/1.3 for which the last several months involved making the protocol look more and more like TLS/1.2 so that it can avoid bugs in middleboxes.

DoH is a bit different... as I understand it, the main motivation is to make the dns available to in-browser js apps, without doing too much damage to the web security model. The tunnelling aspect is more a side-effect than a deliberate attempt to bypass lossage. But the reasons for specifying it really have no influence on how people will use it, and that is where the weird consequences will happen...
This account has disabled anonymous posting.
(will be screened if not on Access List)
(will be screened if not on Access List)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

July 2025

S M T W T F S
  1 2345
6789101112
13141516171819
20212223242526
2728293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated 2025-07-18 10:29
Powered by Dreamwidth Studios