Progress/activities since last time:
* incorporating BridgeRequest's together with an initial bridge request
API over JSON (it's easier to do both as they are tightly related.) The
bridge request api is based on isis' initial fix/12029-dist-api_r1;
* bogus server-side bridge provider that imp
Hi
I have to do some experiments on tor and I must disable counter-based
encryption for cells.
Is there a simple way to do that?
I appreciate any idea.
Soroosh
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/ma
On Fri, 25 Jul 2014 22:19:40 +
isis wrote:
> > Personally I think when we deploy the next round of transports
> > (meek, and either ScrambleSuit or obfs4) would be the right time to
> > revisit this, and I can't think of a good reason to keep obfs2
> > around beyond "there are bridges that on
isis transcribed 4.0K bytes:
> bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs2'
> from-authority/cached-extrainfo* | wc -l
> 2071
> bridgedb@ponticum:/srv/bridges.torproject.org$ grep 'transport obfs3'
> from-authority/cached-extrainfo* | wc -l
> 2840
> bridgedb@ponticum:/srv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yawning Angel transcribed 2.9K bytes:
> On Fri, 25 Jul 2014 13:25:31 +0200
> Lunar wrote:
>
> > isis:
> > > > We can't just make Tor Browser stop accepting obfs2 because some
> > > > people are using obfs2 bridges right now. But we shouldn't add
>
Griffin Boyce transcribed 1.6K bytes:
> Lunar wrote:
> > We can't just make Tor Browser stop accepting obfs2 because some
> > people are using obfs2 bridges right now. But we shouldn't add more
> > people to the set of users of a broken protocol.
>
> We should really be reaching out to those run
On Fri, 25 Jul 2014 13:25:31 +0200
Lunar wrote:
> isis:
> > > We can't just make Tor Browser stop accepting obfs2 because some
> > > people are using obfs2 bridges right now. But we shouldn't add
> > > more people to the set of users of a broken protocol.
> >
> > Obfs3 is also "broken", it's jus
isis:
> > We can't just make Tor Browser stop accepting obfs2 because some people
> > are using obfs2 bridges right now. But we shouldn't add more people to
> > the set of users of a broken protocol.
>
> Obfs3 is also "broken", it's just that we haven't yet seen a DPI box do it
> IRL. If you want
On Fri, 25 Jul 2014 10:00:01 +0200
Lunar wrote:
> isis:
> > > We can't just make Tor Browser stop accepting obfs2 because some
> > > people are using obfs2 bridges right now. But we shouldn't add
> > > more people to the set of users of a broken protocol.
> >
> > Obfs3 is also "broken", it's jus
isis:
> > We can't just make Tor Browser stop accepting obfs2 because some people
> > are using obfs2 bridges right now. But we shouldn't add more people to
> > the set of users of a broken protocol.
>
> Obfs3 is also "broken", it's just that we haven't yet seen a DPI box do it
> IRL.
That's news
Lunar transcribed 2.1K bytes:
> isis:
> > > PS: why are we still shipping obfs2 bridges?!
> >
> >
> > tl;dr: Because we have them.
>
> The protocol is known to be broken and fingerprintable. That's something
> we know. Not users. If BridgeDB is giving them out, then it must be that
> it's ok to
Griffin Boyce transcribed 0.8K bytes:
> isis wrote:
> >Do you have a better suggestion for what to call "vanilla bridges"?
>
> I keep calling them standard bridges (as opposed to fancy, monocle-wearing
> bridges). People seem to understand immediately that other types of bridges
> are special s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Lunar wrote:
> We can't just make Tor Browser stop accepting obfs2 because some
> people are using obfs2 bridges right now. But we shouldn't add more
> people to the set of users of a broken protocol.
We should really be reaching out to those runnin
isis:
> > PS: why are we still shipping obfs2 bridges?!
>
>
> tl;dr: Because we have them.
The protocol is known to be broken and fingerprintable. That's something
we know. Not users. If BridgeDB is giving them out, then it must be that
it's ok to use, right?
We can't just make Tor Browser stop
14 matches
Mail list logo