[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #20348 [Metrics/Censorship analysis]: cyberoam assists bloody dictatorships.



#20348: cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
 Reporter:  dcf                          |          Owner:
     Type:  project                      |         Status:  closed
 Priority:  Medium                       |      Milestone:
Component:  Metrics/Censorship analysis  |        Version:
 Severity:  Normal                       |     Resolution:  invalid
 Keywords:  censorship block kz          |  Actual Points:
Parent ID:                               |         Points:
 Reviewer:                               |        Sponsor:
-----------------------------------------+-------------------------

Comment (by dcf):

 kzblocked provided some more information on IRC.

 The DPI box might have changed or been updated; you can't bypass it by
 sending short segments.

 But you can bypass it by putting HTTP-like bytes inside the random padding
 of the obfs4 client handshake. The padding is ordinarily filled with
 random bytes. Filling the padding with zeroes does not bypass as reliably.

 kzblocked pasted traceroutes to a blocked and an unblocked bridge, but the
 pastes expired before I could see them. The traces to default bridges
 included a hop—82.200.243.106—that wasn't in the traces to non-default
 bridges. However a trace to an online game server also went through
 82.200.243.106.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:143>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs