Encrypt it or lose it: how encrypted SNI works


Today we announced support for encrypted SNI, an extension to the TLS 1.3 protocol that improves privacy of Internet users by preventing on-path observers, including ISPs, coffee shop owners and firewalls, from intercepting the TLS Server Name Indication (SNI) extension and using it to determine which websites users are visiting.
Encrypted SNI, together with other Internet security features already offered by Cloudflare for free, will make it harder to censor content and track users on the Internet. Read on to learn how it works.
SNWhy?
The TLS Server Name Indication (SNI) extension, originally standardized back in 2003, lets servers host multiple TLS-enabled websites on the same set of IP addresses, by requiring clients to specify which site they want to connect to during the initial TLS handshake. Without SNI the server wouldn’t know, for example, which certificate to serve to the client, or which configuration to apply to the connection.
The client adds the SNI extension containing the hostname of the site it’s connecting to to the ClientHello message. It sends the ClientHello to the server during the TLS handshake. Unfortunately the ClientHello message is sent unencrypted, due to the fact that client and server don’t share Continue reading







The PX-Enterprise 1.6 updates take into account the distributed storage nature of modern applications running across different clouds and container environments.
Nokia Slashes 500 Jobs; Oracle Cloud Exec on Extended Leave; SK Telecom Picks 5G Vendors Nokia will cut 500 jobs in Illinois by year-end as part of a restructuring plan. Oracle executives declined to elaborate about the company’s cloud chief taking an extended leave from work. SK Telecom ignored Chinese vendor Huawei and picked Nokia,...
Exfo is onboarding its service assurance VNFs into the Amdocs NFV software and services portfolio, which is powered by ONAP.