Re: webtunnel bridges for the telegram distributor

Thanks, I agree that obfs4 looks like "random data" so it is relatively easy to block with middle-boxes or deep packet inspection. George On Monday, July 21st, 2025 at 1:19 PM, meskio <meskio@torproject.org> wrote:
Quoting George Hartley (2025-07-18 05:32:28)
Russia is extending their Tor block[0]. Currently, they block Fully Encrypted >Protocols like obfs4 on some mobile networks[1].
Does this also apply to obfs4 bridges with timing and packet-size obfuscation enabled on both client and server side (iat-mode=2)?
Yes, is not that they are detecting obfs4 as a protocol, but they block anything that looks like random and they can't recognize.
-- meskio | https://meskio.net/ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: https://meskio.net/crypto.txt -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Nos vamos a Croatan.
participants (1)
-
George Hartley