Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Lunar
isis: PS: why are we still shipping obfs2 bridges?! tl;dr: Because we have them. The protocol is known to be broken and fingerprintable. That's something we know. Not users. If BridgeDB is giving them out, then it must be that it's ok to use, right? We can't just make Tor Browser stop

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Lunar wrote: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. We should really be reaching out to those running

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread isis
Griffin Boyce transcribed 0.8K bytes: isis wrote: Do you have a better suggestion for what to call vanilla bridges? I keep calling them standard bridges (as opposed to fancy, monocle-wearing bridges). People seem to understand immediately that other types of bridges are special somehow

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread isis
Lunar transcribed 2.1K bytes: isis: PS: why are we still shipping obfs2 bridges?! tl;dr: Because we have them. The protocol is known to be broken and fingerprintable. That's something we know. Not users. If BridgeDB is giving them out, then it must be that it's ok to use, right?

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Lunar
isis: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. Obfs3 is also broken, it's just that we haven't yet seen a DPI box do it IRL. That's news to me.

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
On Fri, 25 Jul 2014 10:00:01 +0200 Lunar lu...@torproject.org wrote: isis: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. Obfs3 is also broken,

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Lunar
isis: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. Obfs3 is also broken, it's just that we haven't yet seen a DPI box do it IRL. If you want me to only

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
On Fri, 25 Jul 2014 13:25:31 +0200 Lunar lu...@torproject.org wrote: isis: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. Obfs3 is also broken,

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread isis
Griffin Boyce transcribed 1.6K bytes: Lunar wrote: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we shouldn't add more people to the set of users of a broken protocol. We should really be reaching out to those running

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread isis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Yawning Angel transcribed 2.9K bytes: On Fri, 25 Jul 2014 13:25:31 +0200 Lunar lu...@torproject.org wrote: isis: We can't just make Tor Browser stop accepting obfs2 because some people are using obfs2 bridges right now. But we

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread isis
isis transcribed 4.0K bytes: bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs2' from-authority/cached-extrainfo* | wc -l 2071 bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs3' from-authority/cached-extrainfo* | wc -l 2840

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
On Fri, 25 Jul 2014 22:19:40 + isis i...@torproject.org wrote: Personally I think when we deploy the next round of transports (meek, and either ScrambleSuit or obfs4) would be the right time to revisit this, and I can't think of a good reason to keep obfs2 around beyond there are

[tor-dev] Counter Base Encryption

2014-07-25 Thread Soroosh Sardari
Hi I have to do some experiments on tor and I must disable counter-based encryption for cells. Is there a simple way to do that? I appreciate any idea. Soroosh ___ tor-dev mailing list tor-dev@lists.torproject.org