Re: [tor-talk] WebRTC via Tor
On 06/10/2013 04:56 AM, David Huerta wrote: > Hey all, > > I've been experimenting with using WebRTC in a browser using Tor with > Twilio to see if it's not totally impossible to do voice communication > in a way that anonymizes location (source IP). The problem is that > Twilio WebRTC requires UDP connections over ports 10,000 to 60,000 and > at least from my research (correct me if I'm wrong), Tor doesn't do > onion routing for UDP traffic. As an alternative to WebRTC, there does > seem to be a Twilio Client Flash option* which is TCP-only, but eww > Flash. Any ideas on how to shoehorn UDP traffic into Tor-friendly TCP or > do something else that would produce basically the same effect? > > * > http://www.twilio.com/help/faq/twilio-client/what-are-the-minimum-system-requirements-for-twilio-client I don't know Twilio, but Mumble works well, with voice data as UDP, using OpenVPN through Tor in TCP mode. Although latency may be as much as 1-2 seconds, voice quality is high, with negligible choppiness. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] WebRTC via Tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey all, I've been experimenting with using WebRTC in a browser using Tor with Twilio to see if it's not totally impossible to do voice communication in a way that anonymizes location (source IP). The problem is that Twilio WebRTC requires UDP connections over ports 10,000 to 60,000 and at least from my research (correct me if I'm wrong), Tor doesn't do onion routing for UDP traffic. As an alternative to WebRTC, there does seem to be a Twilio Client Flash option* which is TCP-only, but eww Flash. Any ideas on how to shoehorn UDP traffic into Tor-friendly TCP or do something else that would produce basically the same effect? * http://www.twilio.com/help/faq/twilio-client/what-are-the-minimum-system-requirements-for-twilio-client Thanks, - -- david [.dh] huerta davidhuerta.me - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org mQENBFDlBaMBCADDRmcSL+YpVzawcjwCtm61lQT32VILEPE3o9mZMAfKlYiEtfJY 8r4ggOCdWRoqglPUGOoTSANsQfahxxmyLylFz1D9iNerx9/23iQ8hcFcokoOAdwA fhmNHEdkgyQg9Lyy5KcfGsrzJyxd7SBwMOvbRGudWpuA0+Dp84sQXTxHawp/LUVU G+zCrrc39jeyHWVLdNESxXCW7nOSRe/jU92/PiMTS0VAYZuHE9j93bH37JjLvXZx MgozTZImBxB9SmvT8ztuU1BS9jdmtO9/XD/XjWdvdbWS7z6fjambB8zWWAOkQvz/ TbCeaIVqYEaQspDaAs4jhdzfpRYRUAfk20cpABEBAAG0IkRhdmlkIEh1ZXJ0YSA8 aHVlcnRhbml4QGdtYWlsLmNvbT6JAT8EEwECACkFAlD9jbgCGyMFCQlmAYAHCwkI BwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRA11ya9rgnzKGv1CACBZzhAEGpA5IAB k58CbcDJ4hXg8OSoay24SNi7jdCemp0CEbr1EhHGw3s05sUExl/KRgeQxgazvXtk +Y0ynyguA39U+nu/kkRVhB7vNPXj2GKdcsO9cw92KmCcRhKZiYL3OEAiGXYa/kvl 6YqXxzbw7oshcceDmSAKctsiBHhS/zwpdb4Co1v260H8HXAf+tsDPbkZHVRSNX/V PyhxQFtnFvdEiLE6D6hsMXJWAvNBoeaGb/xaQnU9Elu0JqY+n2372oc2F9ZYsg/D WcwcKb5SkucyXnlph8AXTx3SCTISVVN95Pj8anv2Z1XwKV0iM+K3dp/v0bWsIvRq 07ZFT/hKtCREYXZpZCBIdWVydGEgPGh1ZXJ0YW5peEBvcGVudGlsLmNvbT6JAUIE EwECACwCGyMFCQlmAYAHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAUCUP2N2gIZ AQAKCRA11ya9rgnzKBPcB/4ltGkLGpzhH+4OxI+zRk7qRnF3sFLYJUh/VUSSDU8l Bu8eEYPol1DJ/MGIKqZytvLC6kvevHBRGT3YpEWJ3q97Iqvzpg52RftN8IZpN8dQ 6L8Tr1DLCcIl+F3J0rHBxrU54pXBlPpeo2Yppv2nGo+plFwKkg711A4ZJIUSaG6V hmslIovxoUxo4F0QyRNZ9dPqCzzTP63xJCgh0Ez+WVT8gaan1iE4Ck4xlEH6vMZB 8tVjXx0tCYPyNRwl0DDXkIfX+9s92stIQVDt4srNKcu6yjjQs7f+0UiULotZ3fKX skykx4wBk59BT92VQwBM/tFxgf+p0BLcbasFhCpfTNepiQE/BBMBAgApBQJQ5QWj AhsjBQkJZgGABwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQNdcmva4J8yj6 /gf/f4lSeMMK3yHLxcRQ7vqHJ+TrWCh62AxTHbbabnozGaug42ekZUJWqf+O97DT TpKRhknaTleXWontnotIdHcv/ciFM85SSlO2+k3jouxnyPEIP45wgabAAG55zUZ4 lUGH9z4OZo0j/OuxfTj/EWc1AciuJAONd5Cz6wFpbPMQ4811cB7IrDKPd5pTOe7M B+Y3SpWo95i0DWWeoa3MfXoBUjTjF8c79ZRel+M/9Qxqi9GkD+NWrJbSh1G9Rrkf 4FXFDO2tYadsnXV8+PnR0hoHXHoXSpWQzmbNhYa/OZOhPdgqAuOKTgAoT8rR9ELq vSHsuacDQOli8WqWd/IR4Szi8rkBDQRQ5QWjAQgA0oAIKM8AFYqHIrQocHmTGR/j YybKQ41u+RUkrhzQPGm9lNSIR7MdD+DEwyEPeZLezNzuUk/huA2eZrjI7P/6aire 0CtUePzkrY93/OuDS5Tb9FtduyclCFMVm+OlOkMjBiqUofQsei4mB6FLKKtKRdiH 0jng3UUkTbJY7iAlKannKBWtsuDCTQuguLh1+Z9bQmINiKSefYgYGJgCklhvYahc kX/NKnisepYOwiCldwvbGs6ify962qG14xPf1y/Q4dSCxgSjzLdXDxpp90XEZNiT 5YATzZrPJUrcFZX8/ep6I0COtIE+FnjMDKQ2VLCbC8lOJDcTtJdzXUIALrL69wAR AQABiQElBBgBAgAPBQJQ5QWjAhsMBQkJZgGAAAoJEDXXJr2uCfMoxs0H/j9YpD4m urSQZh8d6yQahM57sxmqBNer4YyZqHzNBVt6jUJ60wM90Yfn2m7mGjcD/GK6/fLq PzLv3VsQmMM+aVcCRGiFR5P/bLx5/t90PAgprrA7/ld3g0yN+5TGkI/fdOXQmApl bnKDy1q9a9CmtD5M+cOU7adIMEI8ymW2t2Cnw/aTEDNIss/eg2IcfvqirgkBuqw4 TtYAZiMhY38zifjTu0n2aUcKv64K4PGZVklo3BWdqN3bpt2cviB/kQCC/9JZNmqs WfZkK1q9rzo0wkJKTCAtmYYGDzOTYHDCXcOaviexnnq2+DDdfngcu1YpBclf2S4P J9HbchaaZTsCADw= =mmiq - -END PGP PUBLIC KEY BLOCK- -BEGIN PGP SIGNATURE- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJRtVyEAAoJEDXXJr2uCfMosnUIAILjf04PueCWutsT244jGMaa 9dKU3NOf9tRHx+8mPxCvWWqnbKpq+oyQCTTecxc8t82cddaP6GfjDZNDYkFhe48Q kQqUW2thxjKh1k1ZvbToNF6lhHRTJVrMTQGvhX0yy1oAB40reUAtcQnOeHr7e0Py HUsTevBpIAfy8iUfk+F+1nTWdw3zrz/YnHRmFYB392at7EQ0InoRyNLgZ7kgZmob /3p4SojuuTUExhXd9+0cXIWd+8PLyjMJXaUrHo0oiDIV+nrRfqrlfrXbNMG+FD97 1LKSwRaIvv1xAPIFZPn4PJlA50AKfWG3qvyEPPF5nYrRZrF4d8zg9eoppAt5yOU= =CibH -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Format-Transforming Encryption Pluggable Transport
We invite users to test our Tor bundles, which includes a pluggable transport based on something we call Format-Transforming Encryption (FTE). We believe FTE has potential to be a valuable tool to evade the suspected protocol white-listing [4] recently reported in Iran. Tor Bundles are available that include our FTE software and are configured by default to work with FTE+Tor bridges deployed in the United States. These bundles [1] and their source [2] are available on github for OSX/Linux. Unfortunately we don't, yet, support Windows. If you're interested in a technical discussion about FTE and how it works, please read our paper [3] or join us over at tor-dev [5]. We're optimistic FTE has long-term potential as a tool to enable users to control how their traffic is classified by passive DPI systems. As one example, over the last month, we've successful tunneled Tor through the Great Firewall of China using FTE to make our traffic "look like" HTTP. We're eager for feedback on this alpha release, so please do not hesitate to contact us with questions. -Kevin P Dyer (and his co-authors) [1] https://github.com/redjack/FTE/tree/master/TorBundles [2] https://github.com/redjack/FTE [3] http://eprint.iacr.org/2012/494 [4] https://lists.torproject.org/pipermail/tor-dev/2013-May/004787.html [5] https://lists.torproject.org/pipermail/tor-dev/2013-June/004999.html ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk