[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #20348 [Metrics/Censorship analysis]: cyberoam assists bloody dictatorships.
#20348: cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
Reporter: dcf | Owner:
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Metrics/Censorship analysis | Version:
Severity: Normal | Resolution: invalid
Keywords: censorship block kz | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------+-------------------------
Comment (by dcf):
kzblocked provided some more information on IRC.
The DPI box might have changed or been updated; you can't bypass it by
sending short segments.
But you can bypass it by putting HTTP-like bytes inside the random padding
of the obfs4 client handshake. The padding is ordinarily filled with
random bytes. Filling the padding with zeroes does not bypass as reliably.
kzblocked pasted traceroutes to a blocked and an unblocked bridge, but the
pastes expired before I could see them. The traces to default bridges
included a hop—82.200.243.106—that wasn't in the traces to non-default
bridges. However a trace to an online game server also went through
82.200.243.106.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:143>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs