[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Re: webtunnel bridges for the telegram distributor



Thanks,

I agree that obfs4 looks like "random data" so it is relatively easy to block with middle-boxes or deep packet inspection.

George

On Monday, July 21st, 2025 at 1:19 PM, meskio <meskio@xxxxxxxxxxxxxx> wrote:

> Quoting George Hartley (2025-07-18 05:32:28)
> 

> > > Russia is extending their Tor block[0]. Currently, they block Fully
> > > Encrypted >Protocols like obfs4 on some mobile networks[1].
> > 

> > Does this also apply to obfs4 bridges with timing and packet-size obfuscation
> > enabled on both client and server side (iat-mode=2)?
> 

> 

> Yes, is not that they are detecting obfs4 as a protocol, but they block anything
> that looks like random and they can't recognize.
> 

> 

> --
> meskio | https://meskio.net/
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> My contact info: https://meskio.net/crypto.txt
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Nos vamos a Croatan.

Attachment: publickey - hartley_george@proton.me - 0xAEE8E00F.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list -- tor-relays@xxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to tor-relays-leave@xxxxxxxxxxxxxxxxxxxx