• 0 Votes
    10 Posts
    1k Views
    johnpozJ

    @JonathanLee tls 1.3 has been used for quite some time.. Any time I bother to look at the connection to pretty much anything its tls 1.3.. This connection to the forums is using tls 1.3

    ensi is dead but long live ech, that could be problematic I would bet..

    But again I don't do any sort of mitm, its not good practice - I want my ssl/tls to be end to end.. As the internet gods intended it to be ;)

    I have no need or desire to run a proxy.. If I want to block someting I would filter on IP or DNS.. Yes I block the bane of filtering doh and dot.

    I run a reverse proxy, but not as a filtering method or as a way to do mitm.. But as a way to offload the ssl connection because the actual services have no ssl support at all, or are a pain to setup. These connections are tls 1.3.. And I don't even allow 1.2, if your not using 1.3 then your not accessing it. And use strict sni - so if you don't send the valid sni your not being proxied in either. This keeps rando port scanners from being able to actually get to the sites interface.

    And I block most of the known scanners from talking to any of my forwards anyway, and only allow access into my forwards if your coming from US IP, etc.

  • pf.os or p0f.fp

    Development
    9
    0 Votes
    9 Posts
    1k Views
    JonathanLeeJ

    @Gertjan Pfsense has the ability in theory to be the first firewall to compartmentalize docker os signatures apart from the host machines and actually control traffic in that manner:) wouldn't that be cool? Again, invasive nation state actors only attack walls at their weakest areas.

  • 0 Votes
    9 Posts
    2k Views
    P

    @Gertjan thanks, it looks like a solid explanation for my case

  • 0 Votes
    4 Posts
    2k Views
    ivorI

    Sorry, but I don't think you understand what TNSR is. Read more about it here https://www.netgate.com/products/tnsr/