Browsers

browsers are permissive if dns is misconfigured, browser tries without ECH

explore how FF and other browsers behave with famility safety software exactly, so far not tested

Non-pure-HTTPS traffic

Jitsi

  • UDP/10000 Jitsi video bridge
  • UDP/3478 STUN server (coturn)
  • TCP/5349 fall-back connection for video/audio communication (in case the UDP connection did not work)
  • TCP/443 (HTTPS) only for the UI, protected with ECH by default

Network Proxy

SOCKS, HTTPS

OCSP and CRL

Downloaded via HTTP but signed by the CA Blocking the access to the lists is possible with packet inspection due to the traffic being unencrypted Browser soft-fail by default OCSP is dead: https://letsencrypt.org/2022/09/07/new-life-for-crls/ Work ongoing to fix these issues

QUIC and SPDY

should work

Firefox

timing issue FF: no new information

Deliberately disabled

The Interop report mentions that ECH is disabled deliberately when local interception software is detected, and also with ISP- or state-level censorship