[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] MITM attack on TLS



Hello,
I know.  OBFS4 makes the traffic unrecognizable to a DPI unit.  Thatâs why I switched from Meek to it.

> On Nov 21, 2015, at 4:14 AM, Ivan Markin <twim@xxxxxxxxxx> wrote:
> 
> Justin:
>> I wonât get into trouble because Iâm not using regular Tor.  Iâm
>> using pluggable transports, which hide the Tor traffic and make it
>> unrecognizable to a DPI box.  This should be good enough even if
>> Meekâs TLS is broken.
> 
> Nope, not good enough. Actually it is _regular_ Tor connection. It is
> just encapsulated into HTTP (without TLS in your case) and easily
> detectable with tools like tcpflow.
> Try to use PTs other than meek like obfs4/ScrambleSuit.
> 
> -- 
> Ivan Markin
> 
> -- 
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk