[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] OBFS4 Blocking
On Thu, Nov 17, 2016 at 05:16:49AM -0600, Justin wrote:
> OBFS4 is blocked behind both filters. Cyberoam is doing some sort of
> timing attack, but I’m not sure what. When a bridge is used by lots of
> people, then it doesn’t work. Even enabling Iat mode=1 or 2 doesn’t
> fix the issue. When I tried a bridge with not many users, it worked no
> matter what Iat mode was set at.
What makes you think it's a timing attack? I would block obfs4 by
checking if a bunch of rules are satisfied, for example: Does the server
reply to arbitrary requests? Is the packet payload of high entropy?
What do the directions of the first n packets look like?
> Behind iBoss, they are fingerprinting Packet Interarrival times. Iat
> mode 1 and 2 worked no matter how much load the bridges had on them.
Is obfs4 blocked if you don't enable IAT mode? It would surprise me if
anyone really uses inter-arrival times for fingerprinting. Packet
jitter causes a lot of noise, which is why I imagine it to be an
unreliable data source. Then again, if the DPI boxes are topologically
close to the origin, the noise might be negligible.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk