Doesn't Vodafone use NAT for customers? If you use mobile internet you get a 10.x.x.x IPv4 behind NAT and a regular IPv6 with your MAC embedded in it. Also, don't overestimate ISPs network design, a few years ago you could get free unlimited mobile internet via VPN because they only redirected TCP traffic to their payment page and let UDP pass. A vendorless MAC in their NAT could very likely trigger a DPI exception and disable traffic shaping.
Dan Snow: > some_guy...@safe-mail.net: >>> Working were and are only connections without the Tor network, with >>> unpublished bridges, and with Tails (changing the MAC address) >> >> That doesn't make sense. Vodafone doesn't see your Tails MAC at all. I think >> it's unlikely that Vodafone is throttling on purpose. >> >> Most likely, there is some broken/misconfigured router or IDS in the path to >> the directory servers/bridges you used. You should try to manually pick a >> few different entry guards with different routing (check with traceroute). >> >> Assuming you have a network consensus (e.g. from connecting with working >> bridges; there should be 'Browser/TorBrowser/Data/Tor/cached-microdescs' and >> 'cached-microdesc-consensus' files), add the following to your >> 'Browser/TorBrowser/Data/Tor/torrc': >> >> ---------------------------- >> UseEntryGuards 1 >> NumEntryGuards 1 >> UseEntryGuardsAsDirGuards 1 >> NumDirectoryGuards 1 >> EntryNodes 47B8A2122B924B0E54B3BDEE48DFB86E054BEB36 >> ----------------------------- >> >> Remove any bridge-related entries from the config. >> >> Some fast entry guards in Germany that should have different routing: >> >> darkit (37.114.52.7): 47B8A2122B924B0E54B3BDEE48DFB86E054BEB36 >> chaoscomputerclub5 (80.237.226.75): 0E22366D0EB12CA0CDD3693452F43BA0A1D9D515 >> becks (5.9.123.81): E9C8154418544764619D2CCD0596B355D7DFF236 >> >> With this configuration, you only need to connect to the the guard node and >> don't need to connect to the directory servers (where something seems to be >> hanging). >> > > Thank you for these advises. But, I think to concentrate on one entry guard > only could lessen the anonymity. Although the entry guards are not changed > very often (after 30–60 days) in the standard configuration, there seems to > be a little random selection [1]. I will have a look at this. > > As we all know, the IP address is no reliable identifier, but the MAC address > identifies the device and probably its user. Otherwise it would be needless > to disguise the MAC address in Tails. As far as I know the MAC address can be > coded in the IP within the ipv6 protocol. So, this makes sense. > > As terrorists and torrorists are per se under suspicion, like criminals and > readers of some Linux Journal [1a], they should be hindered to communicate in > anonymity. Secret services and police agents around the world see anonymity > and encryption as a menace of their work. And ISPs, especially the big > players and former telcos of the state, are executing their needs [2]. > To me it doesn't seem deviously that ISPs are trying to block or impede the > use of the Tor network ("Tor stinks" [2a]). Vodafone is advertising "Secure > Net" which uses DPI (Deep Packet Inspection) for filtering - to make the net > more secure [3]. > > I am very content with the performance of the Tor network using three > different unpublished bridges. > > > > [1] T. Elahi et al., Changing of the Guards: A Framework for Understanding > and Improving Entry Guard Selection in Tor, WPES’12, October 15, 2012. > [http://freehaven.net/~arma/cogs-wpes.pdf] > [1a] > http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html > [1a] http://daserste.ndr.de/panorama/xkeyscorerules100.txt > [1a] > http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance > [2] > http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq > [2] > http://www.heise.de/newsticker/meldung/Snowden-Dokumente-Britische-Geheimdienste-koennten-ueber-Vodafone-deutsche-Kunden-abhoeren-2461441.html > [2014] > [2] > http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html > [2] > https://firstlook.org/theintercept/2014/11/20/vodafone-surveillance-gchq-snowden/ > [2014] > [2] > https://blog.torproject.org/blog/tale-new-censors-vodafone-uk-t-mobile-uk-o2-uk-and-t-mobile-usa > [2012-01-17] > [2a] > http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document > [2a] > https://edwardsnowden.com/wp-content/uploads/2013/10/tor-stinks-presentation.pdf > [2a] > http://www.heise.de/newsticker/meldung/Neues-von-der-NSA-Tor-stinkt-1972983.html > [3] > https://netzpolitik.org/2014/waschmaschine-im-netz-wie-telekom-und-vodafone-deep-packet-inspection-als-feature-verkaufen/ > [3] http://securenet.vodafone.com/index.html > [3] https://twitter.com/usefulthink/status/590817159351242752 > [3] > http://www.webscalenetworking.com/topics/webscalenetworking/articles/404274-vodafone-germany-offers-new-secure-net-service.htm > [2015-06-01]: "Allot Service Gateways, which are high-performance DPI-based > platforms that enable deployment of new digital services in fixed, mobile and > cloud networks" > [3] > http://www.allot.com/press-release/vodafone-germany-makes-web-surfing-secure-with-allot-websafe-personal/ > [2015-05-26] > [3] > http://www.iptegrity.com/index.php/net-neutrality/600-how-vodafone-censors-your-internet > [2011-01-06] > [3] > http://www.rawstory.com/2011/01/vodafone-confirms-role-egypts-cellular-internet-blackout/ > [2011-01-28] > [3] > http://broabandtrafficmanagement.blogspot.com/2010/11/dpi-deployment-41-vodafone-uses-dpi-and.html > [2010-11-18] > > C. Fuchs, Implications of Deep Packet Inspection (DPI) Internet Surveillance > for Society, The Privacy & Security - Research Paper Series 1, 2012 (2013) > [http://www.projectpact.eu/privacy-security-research-paper-series/%231_Privacy_and_Security_Research_Paper_Series.pdf] > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk