Hi everybody,
On Tue, Aug 14, 2012 at 05:13:56PM +0200, tor-admin wrote:We haven't made a big fuss about it, but Tor 0.2.3.17-beta uses a new
> My understanding of bridge detection was, that Chinas GFW is able to detect
> the Tor SSL handshake and does active bridge probing after a successful
> connection to a (for the GFW) unknown bridge IP. So they should be able to
> block any bridge publish or unpublished very quickly, if someone from behind
> the GFW connects to a bridge. Am I missing something?
ciphersuite in the ssl client hello, and I believe China's current DPI
doesn't notice it.
https://lists.torproject.org/pipermail/tor-talk/2012-June/024511.html
The extra-fun part is that if a Tor 0.2.2 client connects to the bridge,
it triggers the probing you describe (and thus the blocking). But if
only Tor 0.2.3.17+ clients connect, no probing (and thus no blocking).
Obfsproxy's obfs2 protocol is way better at not getting blocked currently;
but I'm holding out for an obfs3 release, with a new protocol that's
harder to DPI for, before we push for a big rollout there.
--Roger
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays