[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] allow ssl-encapsulated connections to all tor relays. Stop L7



> I think Ural means the initial handshake when connecting to the entry node
> is easily detectable and identifiable by a L7 firewall (which it is).

Initial handshake is L3 detectable too, and easier on L3 than on L7.
Guard node and directory servers IPs and ports are public.

For example, no need of DPI if you see traffic from not Tor node IP to 
212.47.237.95:9001. This is a Tor client connecting to one of my guards, here 
kitten3.
Or connection from not Tor node IP to 128.31.0.34:9131, this is a client 
looking for consensus data from moria1, one of the Tor directory authorities.

Adding STUNNEL encapsulation or obfuscation here change nothing.

Regards,
-- 
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/

Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk