[tor-talk] MITM attack on TLS
Justin
davisjustin002 at gmail.com
Sat Nov 21 15:32:41 UTC 2015
Hello,
I know. OBFS4 makes the traffic unrecognizable to a DPI unit. That’s why I switched from Meek to it.
> On Nov 21, 2015, at 4:14 AM, Ivan Markin <twim at riseup.net> wrote:
>
> Justin:
>> I won’t get into trouble because I’m not using regular Tor. I’m
>> using pluggable transports, which hide the Tor traffic and make it
>> unrecognizable to a DPI box. This should be good enough even if
>> Meek’s TLS is broken.
>
> Nope, not good enough. Actually it is _regular_ Tor connection. It is
> just encapsulated into HTTP (without TLS in your case) and easily
> detectable with tools like tcpflow.
> Try to use PTs other than meek like obfs4/ScrambleSuit.
>
> --
> Ivan Markin
>
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
More information about the tor-talk
mailing list