[149673] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Iran blocking essentially all encyrpted protocols

daemon@ATHENA.MIT.EDU (Shahab Vahabzadeh)
Sat Feb 11 05:10:16 2012

In-Reply-To: <CAJNg7VJBtM_bNOto0gsZzxMNjbUNSXFOhqACxoZAaVb+-asYCQ@mail.gmail.com>
From: Shahab Vahabzadeh <sh.vahabzadeh@gmail.com>
Date: Sat, 11 Feb 2012 13:39:16 +0330
To: Marshall Eubanks <marshall.eubanks@gmail.com>
Cc: Ryan Malayter <malayter@gmail.com>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

It is not accessible to with XMPP, yahoo google none of them is not accessib=
le from Iran.
I have not try obfsproxy but as a ordinary connection we do not have https :=
)

--
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator

PGP Key Fingerprint =3D 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90

On Feb 10, 2012, at 11:37 PM, Marshall Eubanks <marshall.eubanks@gmail.com> w=
rote:

> And in response
>=20
> http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-o=
nline-tor-tests-undetectable-encrypted-connections/
>=20
> (quoting) :
>=20
> =E2=80=9CBasically, say you want to look like an XMPP chat instead of SSL,=
=E2=80=9D he
> writes to me, referring to a protocol for instant messaging as the
> decoy for the encrypted SSL communications. =E2=80=9CObfsproxy should star=
t
> up, you choose XMPP, and obfsproxy should emulate XMPP to the point
> where even a sophisticated [deep packet inspection] device cannot find
> anything suspicious.=E2=80=9D
>=20
> Regards
> Marshall
>=20
> On Fri, Feb 10, 2012 at 2:03 PM, Shahab Vahabzadeh
> <sh.vahabzadeh@gmail.com> wrote:
>> Yes I am from Iran and outgoing TCP/443 has been stoped ;)
>>=20
>> --
>> Regards,
>> Shahab Vahabzadeh, Network Engineer and System Administrator
>>=20
>> PGP Key Fingerprint =3D 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF9=
0
>>=20
>> On Feb 10, 2012, at 9:56 PM, Ryan Malayter <malayter@gmail.com> wrote:
>>=20
>>> Haven't seen this come through on NANOG yet:
>>> http://arstechnica.com/tech-policy/news/2012/02/iran-reportedly-blocking=
-encrypted-internet-traffic.ars
>>>=20
>>> Can anyone with the ability confirm that TCP/443 traffic from Iran has
>>> stopped?
>>>=20
>>=20


home help back first fref pref prev next nref lref last post