[tor-mirrors] Testing cloudflare on a mirror of tor's website
david at bamsoftware.com
Sun Oct 19 00:54:50 UTC 2014
On Sat, Sep 13, 2014 at 11:00:25PM -0700, David Fifield wrote:
> On Tue, Sep 09, 2014 at 09:05:21PM -0400, Andrew Lewman wrote:
> > Unless some company/country are going to block all of cloudflare or a
> > CDN, our mirrors can still be reachable. This is the same idea that
> > David Fifeld is counting on with the meek transport using Google App
> > Engine. Blocking all of Google seems a huge cost vs the gain of stopping
> > some tor users.
> On that note, it's worth looking at what GreatFire.org is doing for
> some of their mirror sites: https://github.com/greatfire/wiki.
> Here is one of the URLs:
> This URL is from an Akamai reseller, http://cachesimple.com/, who have a
> plan starting at $50/month. The long URL is an explicit form of what
> normally happens implicitly through SNI at the Akamai CDN (see page 5 of
> for Akamai URL structure). The important thing is that all the blockable
> content is encrypted in the path component. The censor only gets to see
> the domain name a248.e.akamai.net, which is some kind of magic Akamai
> HTTPS domain that's used for tons of stuff. I think a mirror like this
> would be very hard to block.
I found out that the a248.e.akamai.net domain name is DNS-poisoned in
China, since late September 2014.
(Click on one of the calendar dates to see details.)
Their wiki page https://github.com/greatfire/wiki replaced Akamai with
More information about the tor-mirrors