On Tue, 21 Feb 2012 14:26:06 +0000, Daniel .koolfy Faucon wrote:
...
> Checking the software's signatures should ensure that you are not 
> bootstrapping from harcoded malicious fake nodes or looking at the wrong
> nodes list, and obfsproxy makes sure there is no recognizable handshake 
> pattern. Even if they suspect it to be tor traffic there is no way
> they can MITM an obfsproxy communication.

As far as I can tell obfsproxy itself can trivially be MITM'd,
which is about as helpful as seeing the client-relay tor traffic
in plain: Not very much.

(And you could just as well use obfsproxy to obfuscate the traffic
to your trusty ssh daemon.)

Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to