[tor-bugs] #20348 [Metrics/Censorship analysis]: cyberoam assists bloody dictatorships.
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Dec 9 12:51:04 UTC 2016
#20348: cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
Reporter: dcf | Owner:
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Metrics/Censorship analysis | Version:
Severity: Normal | Resolution: invalid
Keywords: censorship block kz | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------+-------------------------
Comment (by cypherpunks):
> But you can bypass it by putting HTTP-like bytes inside the random
padding of the obfs4 client handshake. The padding is ordinarily filled
with random bytes. Filling the padding with zeroes does not bypass as
reliably.
Depends net load or something it seems, at 5am of local time no non-random
random padding is matter Like it counts bytes as long as cpu time left,
with some mandatory minimum it seems.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:144>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list