isis:
PS: why are we still shipping obfs2 bridges?!
tl;dr: Because we have them.
The protocol is known to be broken and fingerprintable. That's something
we know. Not users. If BridgeDB is giving them out, then it must be that
it's ok to use, right?
We can't just make Tor Browser stop
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Lunar wrote:
We can't just make Tor Browser stop accepting obfs2 because some
people are using obfs2 bridges right now. But we shouldn't add more
people to the set of users of a broken protocol.
We should really be reaching out to those running
Griffin Boyce transcribed 0.8K bytes:
isis wrote:
Do you have a better suggestion for what to call vanilla bridges?
I keep calling them standard bridges (as opposed to fancy, monocle-wearing
bridges). People seem to understand immediately that other types of bridges
are special somehow
Lunar transcribed 2.1K bytes:
isis:
PS: why are we still shipping obfs2 bridges?!
tl;dr: Because we have them.
The protocol is known to be broken and fingerprintable. That's something
we know. Not users. If BridgeDB is giving them out, then it must be that
it's ok to use, right?
isis:
We can't just make Tor Browser stop accepting obfs2 because some people
are using obfs2 bridges right now. But we shouldn't add more people to
the set of users of a broken protocol.
Obfs3 is also broken, it's just that we haven't yet seen a DPI box do it
IRL.
That's news to me.
On Fri, 25 Jul 2014 10:00:01 +0200
Lunar lu...@torproject.org wrote:
isis:
We can't just make Tor Browser stop accepting obfs2 because some
people are using obfs2 bridges right now. But we shouldn't add
more people to the set of users of a broken protocol.
Obfs3 is also broken,
isis:
We can't just make Tor Browser stop accepting obfs2 because some people
are using obfs2 bridges right now. But we shouldn't add more people to
the set of users of a broken protocol.
Obfs3 is also broken, it's just that we haven't yet seen a DPI box do it
IRL. If you want me to only
On Fri, 25 Jul 2014 13:25:31 +0200
Lunar lu...@torproject.org wrote:
isis:
We can't just make Tor Browser stop accepting obfs2 because some
people are using obfs2 bridges right now. But we shouldn't add
more people to the set of users of a broken protocol.
Obfs3 is also broken,
Griffin Boyce transcribed 1.6K bytes:
Lunar wrote:
We can't just make Tor Browser stop accepting obfs2 because some
people are using obfs2 bridges right now. But we shouldn't add more
people to the set of users of a broken protocol.
We should really be reaching out to those running
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yawning Angel transcribed 2.9K bytes:
On Fri, 25 Jul 2014 13:25:31 +0200
Lunar lu...@torproject.org wrote:
isis:
We can't just make Tor Browser stop accepting obfs2 because some
people are using obfs2 bridges right now. But we
isis transcribed 4.0K bytes:
bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs2'
from-authority/cached-extrainfo* | wc -l
2071
bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs3'
from-authority/cached-extrainfo* | wc -l
2840
On Fri, 25 Jul 2014 22:19:40 +
isis i...@torproject.org wrote:
Personally I think when we deploy the next round of transports
(meek, and either ScrambleSuit or obfs4) would be the right time to
revisit this, and I can't think of a good reason to keep obfs2
around beyond there are
Hi
I have to do some experiments on tor and I must disable counter-based
encryption for cells.
Is there a simple way to do that?
I appreciate any idea.
Soroosh
___
tor-dev mailing list
tor-dev@lists.torproject.org
13 matches
Mail list logo