Re: [tor-dev] Format-Transforming Encryption Pluggable Transport

2013-07-27 Thread Kevin P Dyer
Hi George, I've released FTE v0.1.2-alpha. This release includes bug fixes and an improved build process. You can obtain the new builds from the official FTE website: https://kpdyer.com/fte/ The v0.1.2-alpha binaries have been tested on Ubuntu 12.10, Ubuntu 13.04, RHEL 6.4 and OSX 10.8.4. The 32-

[tor-dev] Status report - HTTP pluggable transport

2013-07-27 Thread Chang Lan
Hi Steven, I deeply apologize for not replying to your emails in the last few weeks. On July 2, I had a bad car accident, and since then I was staying in hospital after a surgery till July 27. I should have let you know earlier to get things less messed up. Sorry again about this. Now I finall

Re: [tor-dev] Idea regarding active probing and follow-up of SSL connections to TOR bridges

2013-07-27 Thread Lag Inimaineb
I have some catching up to do on obfsproxy :). I think obviously agility in pushing out these kinds of solutions is very important, so making a separate python client sounds like a great idea. As for TLS handshake profiling - well, that was also discussed in the original video, but as that video m

Re: [tor-dev] Help with rebasing arma's n23-5 tor branch to current master

2013-07-27 Thread Charlie Belmer
Hey Everyone, I wanted to give quick update on N23 rebasing progress: - Rebase N23 onto Master (Complete) - Refactor N23 to use channels (Complete) - Make clean w/ check-spaces (50%. ETA 7/28) - Testing with Chutney (To-Do) Charlie On Thu, Jul 18, 2013 at 11:43 AM, Karsten Loesing

Re: [tor-dev] Idea regarding active probing and follow-up of SSL connections to TOR bridges

2013-07-27 Thread Philipp Winter
On Sat, Jul 27, 2013 at 05:17:29PM +0300, Lag Inimaineb wrote: > Specifically, after reading Nick Mathewson's proposal, I can see it is pretty > much identical to what I've proposed (though his proposal has been around for > more than a year). Do you have any information as to whether anyone has >

Re: [tor-dev] Idea regarding active probing and follow-up of SSL connections to TOR bridges

2013-07-27 Thread Tom Ritter
On 27 July 2013 10:17, Lag Inimaineb wrote: > As for suggestions such as SWEET, FreeWave, etc. - those would require > changes to the TOR clients (right?), which makes them probably less easy to > use, unless they are merged into the TOR mainline. Same goes for > ScambleSuit, since the shared secr

Re: [tor-dev] Idea regarding active probing and follow-up of SSL connections to TOR bridges

2013-07-27 Thread Lag Inimaineb
Thanks for your response, I'm glad to hear this problem is still interesting :). Specifically, after reading Nick Mathewson's proposal, I can see it is pretty much identical to what I've proposed (though his proposal has been around for more than a year). Do you have any information as to whether

Re: [tor-dev] RFC: obfsproxyssh

2013-07-27 Thread Tom Ritter
On 26 July 2013 23:56, Andreas Krey wrote: > On Tue, 02 Jul 2013 23:42:20 +, Ximin Luo wrote: > ... >> What sort of PKI are you using to verify the pubkey claimed by either side, >> to >> prevent MitM? > > What for? The authentication happens in the next step, > within the OR/bridge protocol.

Re: [tor-dev] Idea regarding active probing and follow-up of SSL connections to TOR bridges

2013-07-27 Thread Philipp Winter
On Sat, Jul 06, 2013 at 09:34:06PM +0300, Lag Inimaineb wrote: > Anyway, one of the main topics discussed in that talk was the problem of > preventing the blockage of TOR bridges by oppressors. While many "fixes" were > mentioned, none of them actually solve the problem of the bridge being > probed