[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #15198 [Censorship analysis]: Cyberoam blocking connections to Tor
#15198: Cyberoam blocking connections to Tor
-------------------------------------+----------------------
Reporter: ioerror | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Censorship analysis | Version:
Resolution: | Keywords: cyberoam
Actual Points: | Parent ID:
Points: |
-------------------------------------+----------------------
Comment (by yawning):
With what I believe to be an uncensored residential connection, one of the
3 scramblesuit bridges is down (`194.xxx.xxx.xxx:8455`), the rest
bootstrap fully. For the record, it's not a great idea to paste full
bridge configs like that but oh well, at least I can test them. If the
bad guys follow all of our track, that's a bunch of bridges burnt....
> it filters conections by protocol, ip address and port number - I
haven't yet fingerprinted the device upstream but I'll add information as
I find it.
Looking at the pcap file:
* `tcp.stream eq 0` (<-> `198.xxx.xxx.xxx:32784), SYN and 4 SYN
retransmissions. No SYN/ACK.
* `tcp.stream eq 1` (<-> `194.xxx.xxx.xxx:8455`), SYN and 4 SYN
retransmissions. No SYN/ACK. This is to be expected as the bridge
appears to be down, or at least not accepting any scramblesuit traffic.
* `tcp.stream eq 2` (<-> `95.xxx.xxx.xxx:57584`), SYN and 4 SYN
retransmissions. No SYN/ACK.
So, yes. All the PTs are getting caught either by a destination IP or
destination port filter, and no DPI is involved. You could try
scramblesuit, obfs3 and obfs4 to bridges that are running on 443, but all
of those protocols are clearly identifiable as "not TLS" so I would be
doubtful as if that would work unless the box is terrible.
Meek should work if the box doesn't do TLS MITM. You could also try using
meek without the domain fronting if they do do HTTPS MITM (as in all your
traffic just gets jammed into HTTP requests). It's blatantly obvious,
trivial to block, and if your threat model includes "thugs at the door for
using Tor", it would be a really bad idea, but it's an option.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15198#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs