[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] MITM attack on TLS
Hello,
I know. OBFS4 makes the traffic unrecognizable to a DPI unit. Thatâs why I switched from Meek to it.
> On Nov 21, 2015, at 4:14 AM, Ivan Markin <twim@xxxxxxxxxx> wrote:
>
> Justin:
>> I wonât get into trouble because Iâm not using regular Tor. Iâm
>> using pluggable transports, which hide the Tor traffic and make it
>> unrecognizable to a DPI box. This should be good enough even if
>> Meekâs TLS is broken.
>
> Nope, not good enough. Actually it is _regular_ Tor connection. It is
> just encapsulated into HTTP (without TLS in your case) and easily
> detectable with tools like tcpflow.
> Try to use PTs other than meek like obfs4/ScrambleSuit.
>
> --
> Ivan Markin
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk