[tor-talk] MITM attack on TLS

Justin davisjustin002 at gmail.com
Sat Nov 21 15:32:41 UTC 2015


Hello,
I know.  OBFS4 makes the traffic unrecognizable to a DPI unit.  That’s why I switched from Meek to it.

> On Nov 21, 2015, at 4:14 AM, Ivan Markin <twim at riseup.net> wrote:
> 
> Justin:
>> I won’t get into trouble because I’m not using regular Tor.  I’m
>> using pluggable transports, which hide the Tor traffic and make it
>> unrecognizable to a DPI box.  This should be good enough even if
>> Meek’s TLS is broken.
> 
> Nope, not good enough. Actually it is _regular_ Tor connection. It is
> just encapsulated into HTTP (without TLS in your case) and easily
> detectable with tools like tcpflow.
> Try to use PTs other than meek like obfs4/ScrambleSuit.
> 
> -- 
> Ivan Markin
> 
> -- 
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk



More information about the tor-talk mailing list