On 7 Oct 2015, at 10:52, Brandon Wiley <brandon@blanu.net> wrote:Hello! I am a researcher focusing on blockability of Tor connections. If you have pcap files that you would like to share showing Tor SSL connections that have been blocked and non-Tor SSL connections that have not been blocked, this would be helpful for my research. I have this pcap analysis framework: https://github.com/blanu/AdversaryLab-offline as well as this transport for Tor that uses the analysis to find an optimal encoding so that Tor connections are not blocked: https://github.com/blanu/Dust So essentially given two sets of pcaps, one for blocked connections and one for unblocked connections, I can automatically unblock Tor connections.
If you don't have pcap files or you don't want to share them, if you have access to a network that blocks Tor in a reproducible way, perhaps we could run some tests
Let me know if you're interested!On Tue, Oct 6, 2015 at 6:06 PM, Tim Wilson-Brown - teor <teor2345@gmail.com> wrote:Hi All,This morning I observed a “free wifi” network blocking tor’s SSL connections. While other SSL connections from my machine went through, I observed multiple network traces of tor completing a TCP 3-way handshake, and then getting no reply to the first SSL packet it sent.I think they may have been blocking unknown or untested certificates, but I can’t be sure.Still, I was able to use meek(-google) to access tor.Has anyone else seen this kind of blocking behaviour?(Is this the right list?)TimTim Wilson-Brown (teor)teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev