On Wed, 03 Oct 2018 13:03:14 +, ithor wrote:
...
> Can you elaborate upon that for the noob I am. If i understand you correctly,
> when using domain fronting, Tor basically spoofs or "hijacks" the ip address
> of an existing Azure server client ?
SNI: Server Name Indication. While setting
The IP address of the Azure server you're connecting to.
> How does the selection of the Azure server works ? Randomly ? If i understood
> well, domain-fronting servers are supposedly located geographically close to
> the origin of the browser request. Could it be that TBB selects an Azure
>
On Wed, Oct 03, 2018 at 12:25:52PM +, ithor wrote:
> So a meek request is sent in clear-text. What exact information is given ?
> The exact ip address of the Azure server, its geolocation ?
The IP address of the Azure server you're connecting to. In the case of
meek-azure the firewall would
On Wed, Oct 03, 2018 at 08:30:53AM -0400, James Bunnell wrote:
> I'm a little curious why some people don't take G Suite into consideration :)
Google clearly doesn't like seeing it's services used for censorship
circumvention.
Or they don't want to ruin their standing with the client who
has the name that is used in the SNI (and who takes the loss
when china should decide to block that b/c it's used by fronters).
Can you elaborate upon that for the noob I am. If i understand you correctly,
when using domain fronting,
On Wed, 03 Oct 2018 14:06:27 +, Jonathan Marquardt wrote:
...
> They did so supposedly because it voilated their terms of use.
It also probably violates a few RFCs, and they never advertised
this 'feature'.
> They probably don't want to ruin their relationships with totalitarian
> regimes.
I'm a little curious why some people don't take G Suite into consideration :)
On Wed, Oct 3, 2018 at 8:26 AM ithor wrote:
>
> ok, so for once i'll keep my fingers crossed for Microsoft...
>
> How should I imagine the connection until the Azure server. What does it tell
> the DPI ? Just that I'm
ok, so for once i'll keep my fingers crossed for Microsoft...
How should I imagine the connection until the Azure server. What does it tell
the DPI ? Just that I'm connecting to a close-to-my-country-based Microsoft CDN
?
On wikipage it's stated that
The technique works by using different
On Wed, Oct 03, 2018 at 08:38:52AM +, ithor wrote:
> ever since TBB 8, there's the new moat way to obtain private obfs4 bridges
> through a CAPTCHA. In the following webpage it's stated meek is used in
> order to communicate with the Tor bridges database. Now, my question is :
> which ones
Ok, so basically I have to stick with trust... kinda dangerous really in my
geographical location.
I know there's a lot of talk about the pro and contra of using some kind of VPN
before entering the Tor network, how it can deanonymize you and how you
basically still have to trust someone.
But
On Wed, 03 Oct 2018 08:41:29 +, ithor wrote:
...
> So would there be a way to (pen-?)test a private obfs4 bridge as being non
> blacklisted and actually usable without really trying to connect to it and
> alarming my ISP and DPI the like ?
Obviously not. To test that you need to try to
I think that tor is not designed to enable you to hide the fact you are using
tor from an adversary. And that technologies like bridges are there to enable
you to get out, not to hide the fact that you are getting out or may have in
the past or may in the future. That is to say; methods for
Hi,
when living under an oppressive regime with draconian Internet censorship, it
is crucial for me to be able to connect to the Tor network without arousing any
suspicion and to be sure I'm not connecting to a malicious entry-node or obfs4
bridge.
The only way for me to bypass DPI is to use
Hi,
ever since TBB 8, there's the new moat way to obtain private obfs4 bridges
through a CAPTCHA. In the following webpage it's stated meek is used in order
to communicate with the Tor bridges database. Now, my question is : which ones
? In my country, domain fronting for Amazon and Google are
14 matches
Mail list logo