[liberationtech] popular circumvention tools have been blocked in Iran
Adam Fisk
afisk at getlantern.org
Fri Feb 12 14:27:48 PST 2016
What blocking we've seen with Lantern also corroborates Collin's
analysis in terms of blocking appearing to be IP enumeration and not
traffic classification. We've also seen increases in blocking on
weekends when perhaps they think we're not watching!
-Adam
On Wed, Feb 10, 2016 at 3:00 PM, Joseph Lorenzo Hall <joe at cdt.org> wrote:
> So so so helpful, Collin!
>
> On Wed, Feb 10, 2016 at 1:58 PM, Collin Anderson
> <collin at averysmallbird.com> wrote:
>>
>> On Wed, Feb 10, 2016 at 11:09 AM, Joseph Lorenzo Hall <joe at cdt.org> wrote:
>>>
>>> Do we have any indication as to how they are blocking (e.g., given Iran's
>>> past history, I'd tend to think it involves fingerprinting circumvention
>>> tech protocols). best, Joe
>>
>>
>> I don't believe its traffic classification on circumvention tools; the
>> proliferation of obfsproxy-style and meek transports beyond Tor seems to
>> made this more difficult. For the particular tools that I have checked, it
>> appeared to be enumeration of network entry points through the censors
>> running the tool or collecting aggregated network statistics from users, and
>> then blocking found addresses. In certain cases, this layer three blocking
>> and in others through in-line blocking on the application layer. In the
>> latter scenario, the intention seems though to simply block SSL connection
>> for addresses, and nothing more fine grain, e.g. whitelisting/blacklisting.
>>
>> Would be happy to test any tools, maybe FreeGate is next.
>> --
>> Collin David Anderson
>> averysmallbird.com | @cda | Washington, D.C.
>>
>> --
>> Liberationtech is public & archives are searchable on Google. Violations of
>> list guidelines will get you moderated:
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
>> change to digest, or change password by emailing moderator at
>> companys at stanford.edu.
>
>
>
> --
> Joseph Lorenzo Hall
> Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
> e: joe at cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
> Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10 1607 5F86 6987 40A9 A871
>
> CDT's annual dinner, Tech Prom, is April 6, 2016! https://cdt.org/annual-dinner
> --
> Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu.
--
--
President
Brave New Software Project, Inc.
https://www.getlantern.org
pgp A998 2B6E EF1C 373E 723F A813 045D A255 901A FD89
More information about the liberationtech
mailing list