And in response http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-onl... (quoting) : “Basically, say you want to look like an XMPP chat instead of SSL,” he writes to me, referring to a protocol for instant messaging as the decoy for the encrypted SSL communications. “Obfsproxy should start up, you choose XMPP, and obfsproxy should emulate XMPP to the point where even a sophisticated [deep packet inspection] device cannot find anything suspicious.” Regards Marshall On Fri, Feb 10, 2012 at 2:03 PM, Shahab Vahabzadeh <sh.vahabzadeh@gmail.com> wrote:
Yes I am from Iran and outgoing TCP/443 has been stoped ;)
-- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator
PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81 C2EE 76A2 46C2 5367 BF90
On Feb 10, 2012, at 9:56 PM, Ryan Malayter <malayter@gmail.com> wrote:
Haven't seen this come through on NANOG yet: http://arstechnica.com/tech-policy/news/2012/02/iran-reportedly-blocking-enc...
Can anyone with the ability confirm that TCP/443 traffic from Iran has stopped?