Thanks,

I agree that obfs4 looks like "random data" so it is relatively easy to block 
with middle-boxes or deep packet inspection.

George

On Monday, July 21st, 2025 at 1:19 PM, meskio <[email protected]> wrote:

> Quoting George Hartley (2025-07-18 05:32:28)
> 

> > > Russia is extending their Tor block[0]. Currently, they block Fully
> > > Encrypted >Protocols like obfs4 on some mobile networks[1].
> > 

> > Does this also apply to obfs4 bridges with timing and packet-size 
> > obfuscation
> > enabled on both client and server side (iat-mode=2)?
> 

> 

> Yes, is not that they are detecting obfs4 as a protocol, but they block 
> anything
> that looks like random and they can't recognize.
> 

> 

> --
> meskio | https://meskio.net/
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> My contact info: https://meskio.net/crypto.txt
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Nos vamos a Croatan.

Attachment: publickey - [email protected] - 0xAEE8E00F.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to