On Thu, 1 Oct 2015 08:26:50 -0700 David Fifield <david@xxxxxxxxxxxxxxx> wrote: > I don't know about a schedule for deploying SkypeMorph and Dust. They > may not help in your case anyway. The GFW is probably blocking the IP > addresses of your bridges, not detecting the obfs4 protocol itself. SkypeMorph: Never. (Licensing issues among other things) Dust: I assume you mean Dust2, the original Dust is not getting deployed. Not sure yet. [Folding in the 2nd reply] > If you know some details of how I2P resists blocking, please add them > to this wiki page: > https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports It doesn't do anything special. The old TCP based protocol (NTCP) is trivially identifiable. Blocking the more modern UDP protocol (SSU) would require looking for high-entropy UDP or doing statistical attacks IIRC. Active probing is possible if they run a node that's part of the network and obtain enough key material (But, I'd need to look at the floodfill system again to figure out how many nodes for how long is realistically required). Regards, -- Yawning Angel
Attachment:
pgpr5PW1wGyNu.pgp
Description: OpenPGP digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev