←back to thread

411 points donpott | 1 comments | | HN request time: 0s | source
Show context
nickdothutton ◴[] No.44983582[source]
Step 1, pass law.

Step 2, demand compliance.

Step 3, upon not hearing of compliance, levy fines.

Step 4, upon non payment of fines, declare in breach of (2).

Step 5, block site from UK using DNS, in the same manner as torrent sites etc.

5 was always the goal, 2 to 4 are largely just performative.

replies(13): >>44983768 #>>44983781 #>>44983897 #>>44984120 #>>44984248 #>>44985133 #>>44985729 #>>44985841 #>>44985859 #>>44986058 #>>44986633 #>>44988012 #>>44991247 #
username332211 ◴[] No.44983781[source]
How does step 5 work? Switching DNS servers is trivial.
replies(4): >>44983797 #>>44985060 #>>44985122 #>>44988308 #
CommanderData ◴[] No.44985060[source]
step 6: Block non-compliant DNS servers
replies(1): >>44985314 #
kps ◴[] No.44985314[source]
Step 7: Camera AI that can catch the people scribbling “Sci-Hub is 190.115.31.218” on a bathroom wall.
replies(2): >>44985390 #>>44987017 #
NoMoreNicksLeft ◴[] No.44985390[source]
Does that even work anymore? I thought plain IP addresses were a thing of the past ever since we started doing virtual hosts 25 years ago. I just get a 503 when I use the address you posted...
replies(3): >>44985451 #>>44985649 #>>44985658 #
CWuestefeld ◴[] No.44985649[source]
If you just point your browser to https://<ip_address> then it won't work. You also need to have the correct hostname in the http request headers.

The easiest way to accomplish this is to add the address into your .hosts file (as sibling post says) and just use the name.

replies(1): >>44986510 #
1. CommanderData ◴[] No.44986510[source]
As well as SNI, most reverse proxies need to know which TLS cert to serve. Lower than layer 7.