Hi,
I have a DPI box that I use to test pluggable transports with.  I also test 
other circumvention tools against it just to see how good it is.  Manufacturer 
is Cyberoam.  About 6 or 8 weeks ago, Cyberoam released a DPI engine update 
that could filter normal Tor and the following pluggable transports:
OBFS3
OBFS4
Scramblesuit
About a week ago, Cyberoam released another update to its application filter.  
This update allows it to filter all Meek connections without doing a man in the 
middle on the TLS or anything.  When I try to load www.google.com 
<http://www.google.com/>, it loads fine in a normal Firefox.  When I use Meek, 
it fails and the Cyberoam logs a Tor Proxy attempt.  The only transport that 
still works is FTE.  I was talking with Arma on the Tor IRC channel a wile ago, 
and he suggested that I use Tcpreplay and send in a copy of what Cyberoam is 
fingerprinting.  I will have to wait a wile until I do this, because the school 
year hasn’t ended yet.  I’m sending out this message to alert Tor users of the 
new threat and also to see what some solutions may be, E.G new transports in 
the works.
Thanks, and stay safe.
Justin.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to