[tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

Jonathan Marquardt mail at parckwart.de
Wed Oct 3 13:36:53 UTC 2018


On Wed, Oct 03, 2018 at 12:25:52PM +0000, ithor wrote:
> So a meek request is sent in clear-text. What exact information is given ? 
> The exact ip address of the Azure server, its geolocation ?

The IP address of the Azure server you're connecting to. In the case of 
meek-azure the firewall would also see that you supposedly want to connect to 
"ajax.aspnetcdn.com", which is a common domain used by websites that are 
hosted on Azure. The domain delivers some JavaScript code and whatnot. So you 
should just look like a harmless web browser surfing the web on first sight.

> Could the DPI find out that this is being used for bootstrapping Tor ?

Perhaps with some clever traffic correlation or timing attacks, but not so 
easily.

To also answer your question from the other mail in the thread: With encrypted 
SNI, the firewall couldn't even see the fake destination (ajax.aspnetcdn.com) 
your meek client sends.

This might be interesting in the future, but isn't in use with meek yet. For 
more info on that topic, have a look at this thread: 
https://lists.torproject.org/pipermail/tor-dev/2018-September/013452.html
-- 
OpenPGP Key: 47BC7DE83D462E8BED18AA861224DBD299A4F5F3
             https://www.parckwart.de/pgp_key
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20181003/d340cd27/attachment.sig>


More information about the tor-talk mailing list