[tor-talk] Tor users trackable with common proxy?

Andreas Krey a.krey at gmx.de
Tue Feb 21 17:48:01 UTC 2012


On Tue, 21 Feb 2012 14:26:06 +0000, Daniel .koolfy Faucon wrote:
...
> Checking the software's signatures should ensure that you are not bootstrapping from harcoded malicious fake nodes or looking at the wrong
> nodes list, and obfsproxy makes sure there is no recognizable handshake pattern. Even if they suspect it to be tor traffic there is no way
> they can MITM an obfsproxy communication.

As far as I can tell obfsproxy itself can trivially be MITM'd,
which is about as helpful as seeing the client-relay tor traffic
in plain: Not very much.

(And you could just as well use obfsproxy to obfuscate the traffic
to your trusty ssh daemon.)

Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800


More information about the tor-talk mailing list