[tor-talk] passive analysis of encrypted traffic and traffic obfuscation

2011-05-17 Thread vecna
Hi tor guys, encrypted traffic analysis is an analysis apply to an encrypted session in order not to disclose the protected data, but to detect the protocol protected. the IRAN attack in TOR was, more or less, an attack like them. (more or less because was based on the HTTPS pattern, not in an

Re: [tor-talk] passive analysis of encrypted traffic and traffic obfuscation

2011-05-17 Thread Fabio Pietrosanti (naif)
On 5/17/11 11:12 AM, vecna wrote: Hi tor guys, encrypted traffic analysis is an analysis apply to an encrypted session in order not to disclose the protected data, but to detect the protocol protected. COOL 1) try a blocked TOR version in IRAN, to verify if the session is protected

[tor-talk] 504 Proxy loop detected by Polipo

2011-05-17 Thread David Carlson
I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received the following error message when trying to access www.stcharlessingers.com. I was able to access the site when I used TorButton to bypass Tor with my Firefox 4.0.1 browser The following error occurred while trying to access

Re: [tor-talk] 504 Proxy loop detected by Polipo

2011-05-17 Thread Robert Ransom
On Tue, 17 May 2011 13:51:42 -0500 David Carlson carlson...@sbcglobal.net wrote: I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received the following error message when trying to access www.stcharlessingers.com. I was able to access the site when I used TorButton to bypass Tor

[tor-talk] Use KiXtart to change identies

2011-05-17 Thread David H. Lipman
How can I use the KiXtart scripting laguage to change identities ? DDE ? COM Automation ? -- Dave Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp ___ tor-talk mailing list tor-talk@lists.torproject.org

Re: [tor-talk] passive analysis of encrypted traffic and traffic obfuscation

2011-05-17 Thread vecna
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Brandon Wiley wrote: This is an interesting method of obfuscation as it seems like it would interfere to some extent with the three most popular DPI techniques: string matching, packet lengths, and packet timings. However, like most obfuscation