[149647] in North American Network Operators' Group
Re: Iran blocking essentially all encyrpted protocols
daemon@ATHENA.MIT.EDU (Marshall Eubanks)
Fri Feb 10 15:08:06 2012
In-Reply-To: <D4CC1941-285F-46E6-BC5B-E426A6BB7657@gmail.com>
Date: Fri, 10 Feb 2012 15:07:15 -0500
From: Marshall Eubanks <marshall.eubanks@gmail.com>
To: Shahab Vahabzadeh <sh.vahabzadeh@gmail.com>
Cc: Ryan Malayter <malayter@gmail.com>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
And in response
http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-on=
line-tor-tests-undetectable-encrypted-connections/
(quoting) :
=93Basically, say you want to look like an XMPP chat instead of SSL,=94 he
writes to me, referring to a protocol for instant messaging as the
decoy for the encrypted SSL communications. =93Obfsproxy should start
up, you choose XMPP, and obfsproxy should emulate XMPP to the point
where even a sophisticated [deep packet inspection] device cannot find
anything suspicious.=94
Regards
Marshall
On Fri, Feb 10, 2012 at 2:03 PM, Shahab Vahabzadeh
<sh.vahabzadeh@gmail.com> wrote:
> Yes I am from Iran and outgoing TCP/443 has been stoped ;)
>
> --
> Regards,
> Shahab Vahabzadeh, Network Engineer and System Administrator
>
> PGP Key Fingerprint =3D 8E34 B335 D702 0CA7 5A81 =A0C2EE 76A2 46C2 5367 B=
F90
>
> On Feb 10, 2012, at 9:56 PM, Ryan Malayter <malayter@gmail.com> wrote:
>
>> Haven't seen this come through on NANOG yet:
>> http://arstechnica.com/tech-policy/news/2012/02/iran-reportedly-blocking=
-encrypted-internet-traffic.ars
>>
>> Can anyone with the ability confirm that TCP/443 traffic from Iran has
>> stopped?
>>
>