Iran blocking essentially all encyrpted protocols

Shahab Vahabzadeh sh.vahabzadeh at gmail.com
Sat Feb 11 10:09:16 UTC 2012


It is not accessible to with XMPP, yahoo google none of them is not accessible from Iran.
I have not try obfsproxy but as a ordinary connection we do not have https :)

--
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator

PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90

On Feb 10, 2012, at 11:37 PM, Marshall Eubanks <marshall.eubanks at gmail.com> wrote:

> And in response
> 
> http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-online-tor-tests-undetectable-encrypted-connections/
> 
> (quoting) :
> 
> “Basically, say you want to look like an XMPP chat instead of SSL,” he
> writes to me, referring to a protocol for instant messaging as the
> decoy for the encrypted SSL communications. “Obfsproxy should start
> up, you choose XMPP, and obfsproxy should emulate XMPP to the point
> where even a sophisticated [deep packet inspection] device cannot find
> anything suspicious.”
> 
> Regards
> Marshall
> 
> On Fri, Feb 10, 2012 at 2:03 PM, Shahab Vahabzadeh
> <sh.vahabzadeh at gmail.com> wrote:
>> Yes I am from Iran and outgoing TCP/443 has been stoped ;)
>> 
>> --
>> Regards,
>> Shahab Vahabzadeh, Network Engineer and System Administrator
>> 
>> PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90
>> 
>> On Feb 10, 2012, at 9:56 PM, Ryan Malayter <malayter at gmail.com> wrote:
>> 
>>> Haven't seen this come through on NANOG yet:
>>> http://arstechnica.com/tech-policy/news/2012/02/iran-reportedly-blocking-encrypted-internet-traffic.ars
>>> 
>>> Can anyone with the ability confirm that TCP/443 traffic from Iran has
>>> stopped?
>>> 
>> 




More information about the NANOG mailing list