Response inline.
On Mon, Sep 7, 2015 at 3:29 PM, Yawning Angel <yawn...@schwanenlied.me>
wrote:
> On Mon, 7 Sep 2015 14:37:07 -0700
> Kevin P Dyer <kpd...@gmail.com> wrote:
>
> > ...and it shouldn't.
> >
> > Fortunately, the dependency is isolate
...and it shouldn't.
Fortunately, the dependency is isolated to a single file. See [1].
My understanding is that pyptlib [2] is no longer maintained.
wiley/asn/etc. - What's the proper way to remove this dependency, but make
it easy for fteproxy to be a PT?
-Kevin
[1]
On Sat, Aug 22, 2015 at 12:43 AM, Yawning Angel yawn...@schwanenlied.me
wrote:
On Fri, 21 Aug 2015 17:51:20 -0700
Kevin P Dyer kpd...@gmail.com wrote:
On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel
yawn...@schwanenlied.me wrote:
[snip]
The FTE semantic attack they presented
Hey Philipp!
Thanks for the interest! I'm one of the authors on the paper. My response
is inline.
On Wednesday, August 19, 2015, Philipp Winter p...@nymity.ch wrote:
https://kpdyer.com/publications/ccs2015-measurement.pdf
They claim that they are able to detect obfs3, obfs4, FTE, and
On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel yawn...@schwanenlied.me
wrote:
[snip]
The FTE semantic attack they presented isn't the easiest one I know of
(the GET request as defined by the regex is pathologically malformed).
Very interesting! This is news to me. I'm assuming I did
...@torproject.org
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 29/12/14 19:57, Karsten Loesing wrote:
On 29/12/14 19:02, Kevin P Dyer wrote:
The Bridge users by transport [1] graph on
metrics.torproject.org abruptly stops at Dec. 12 for all
transports.
Has anyone had an opportunity
The Bridge users by transport [1] graph on metrics.torproject.org
abruptly stops at Dec. 12 for all transports.
Has anyone had an opportunity to troubleshoot this issue?
-Kevin
[1]
Hi David,
I don't believe it has anything to do with bridges being blocked.
Here's what I know: There was a few days downtime at the end of August for
the first-listed FTE bridge in the Tor Browser. However, not all FTE
bridges listed in the Tor Browser were down at that time. It should have
Hi Marc,
Thanks for doing this work, I'm excited to see what you learn this summer.
However, I'm a bit confused by statements like: The idea is to implement a
set of primitives that any link padding-based defense would benefit [from].
Can you provide a high-level diagram that explains where
Hi George,
I've released version 0.2.14 of fteproxy [1], with corresponding changes
[2] to the Tor Browser. This release addresses ticket #11629 [3], thanks to
Yawning's patch [6].
My changes [2] to the tor-browser-bundle include the following:
- Updated fteproxy to 0.2.14
- Updated obfsproxy
Hi Mike,
It looks like [1] broke FTE [2].
Can you hold off on pushing any releases public, until we resolve #11629?
George - Can we revert obfsproxy back to 0.2.4, to give me time to sort
this out?
-Kevin
[1]
On Mon, Apr 28, 2014 at 11:06 AM, George Kadianakis desnac...@riseup.netwrote:
Kevin P Dyer kpd...@gmail.com writes:
Hi Mike,
It looks like [1] broke FTE [2].
Can you hold off on pushing any releases public, until we resolve #11629?
George - Can we revert obfsproxy back to 0.2.4
On Wed, Jan 15, 2014 at 7:16 PM, Jim Rucker mrjim...@gmail.com wrote:
[snip]
From my understanding (please correct me if I'm wrong) Tor has a weakness in
that if someone can monitor data going into the relays and going out of the
exit nodes then they can defeat the anonymity of tor by
On Fri, Jan 3, 2014 at 6:20 AM, George Kadianakis desnac...@riseup.net wrote:
Hello Kevin,
I saw your recent changes to the FTE codebase. The code looks nice!
I then tried to test it, but I got a bit confused by the CLI. I wanted to
try the good ol' ncat test, where I put FTE in the middle,
I've response to the good feedback [1] from asn, nickm, and yawning,
I've tagged v0.2.2 [2] of fteproxy. This release includes the removal
of gmpy as a dependency, additional documentation to explain the
significance of language theoretical algorithms, and bounds checking
of the input/output of
Hi Mike/dcf1,
Building the pt branch [1] of tor-browser-bundle on Ubuntu 13.04,
64-bit resulted in the following error:
./bin/gbuild:21:in `system!': failed to run on-target setarch i386
bash -x var/build-script var/build.log 21 (RuntimeError)
from ./bin/gbuild:121:in
Hi dcf1/asn,
Yesterday I tagged release v0.2.1 of fteproxy. In this release I
focused on breaking away from heavyweight dependencies: OpenFST and
boost.
Cross-platform PTTBB binaries are available on the fteproxy website:
https://fteproxy.org/download.
asn - Please have a look at the code and
Hi dardok,
Thanks for thinking about HTTP pluggable transports. It turns out to
be a deceptively hard problem!
Do you have any initial high-level goals? Or are you just trying to
figure out *some* way to bootstrap an existing HTTP client/server
architecture to tunnel arbitrary data streams?
I'm pleased to announce the release candidate of a pluggable transport
powered by Format-Transforming Encryption. Cross-platform PTTBBs are
available on the FTE website:
https://fteproxy.org/download
dcf - I've added a patch to ticket #9941. This patch can be applied to
[2], to integrate FTE
Hi George,
Maybe I'm missing something from the discussions that happened eight
months ago at the dev meeting. (as per the initial comment in [1])
However, I guess I'm a bit confused about the motivation.
Just to be clear, the goal is to be able to combine multiple
transports easily, right? For
Hi David!
Thanks for the detailed response. My thoughts are inline.
On Sun, Oct 6, 2013 at 3:30 PM, David Fifield da...@bamsoftware.com wrote:
On Sat, Oct 05, 2013 at 11:08:40AM -0400, Kevin P Dyer wrote:
Sorry I missed the most recent Pluggable Transport bi-weekly meeting.
In regards
On Wed, Oct 9, 2013 at 12:22 PM, David Fifield da...@bamsoftware.com wrote:
On Wed, Oct 09, 2013 at 12:02:20PM -0400, Kevin P Dyer wrote:
On Sun, Oct 6, 2013 at 3:30 PM, David Fifield da...@bamsoftware.com wrote:
This is a good start and goes a long way towards automating the build
process
Hi David,
Sorry I missed the most recent Pluggable Transport bi-weekly meeting.
In regards to the PTTBB build, I plan to make progress towards a
streamlined build process.
Platforms I want to get the PTTBB build working on:
1) CentOS 5.9 (32-bit)
2) CentOS 5.9 (64-bit)
3) Windows 7
4) OSX 10.8
-bit/64-bit linux binaries were
compiled on RHEL6.4 with GLIBC 2.12.
Please let me know if this resolves the issue you encountered.
-Kevin
On Wed, Jul 24, 2013 at 10:51 PM, Kevin P Dyer kpd...@gmail.com wrote:
Hi George,
Thanks for trying FTE!
Apologies, this is my fault. I built the current
the Great Firewall of
China, using FTE to make our traffic look like HTTP.
We're eager for feedback on this alpha release, so please do not
hesitate to contact us with questions.
-Kevin P Dyer (and his co-authors)
[1] https://lists.torproject.org/pipermail/tor-dev/2012-September/003993.html
[2
On Thu, Sep 6, 2012 at 3:30 PM, David Fifield da...@bamsoftware.com wrote:
On Thu, Sep 06, 2012 at 09:25:58AM -0700, Kevin P Dyer wrote:
Following my email to this list, dated 29/07/2012, I direct your
attention to the IACR eprint document http://eprint.iacr.org/2012/494,
Format-Transforming
26 matches
Mail list logo