[tor-bugs] #20348 [Metrics/Censorship analysis]: cyberoam assists bloody dictatorships.
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Dec 8 19:47:57 UTC 2016
#20348: cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
Reporter: dcf | Owner:
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Metrics/Censorship analysis | Version:
Severity: Normal | Resolution: invalid
Keywords: censorship block kz | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------+-------------------------
Comment (by dcf):
kzblocked provided some more information on IRC.
The DPI box might have changed or been updated; you can't bypass it by
sending short segments.
But you can bypass it by putting HTTP-like bytes inside the random padding
of the obfs4 client handshake. The padding is ordinarily filled with
random bytes. Filling the padding with zeroes does not bypass as reliably.
kzblocked pasted traceroutes to a blocked and an unblocked bridge, but the
pastes expired before I could see them. The traces to default bridges
included a hop—82.200.243.106—that wasn't in the traces to non-default
bridges. However a trace to an online game server also went through
82.200.243.106.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:143>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list