In association with heise online

16 September 2011, 12:32

Iranian block on Tor traffic quickly foiled

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

The online privacy and security service Tor 0.2.3.4-alpha, and once this is installed on relays and bridges, the company expects normal service to be resumed for users in Iran.

A report on the Tor web site explains how the filter worked. The Iranian block used a peculiarity in the expiry time of Tor's SSL certificates, which was a very unusual two hours and very different to the year which might be typical for a normal CA certificate. It was this minor difference that enabled Tor traffic to be recognised and subsequently blocked. To fix the problem, at least for now, Tor has given its certificates more typical expiry times.

The company accepts that it needs to develop both medium and longer term solutions to the problem of being blocked, and notes that the last time Iran attempted to block its traffic was in January 2011.

See also:

(ehe)

Print Version | Send by email | Permalink: http://h-online.com/-1344762
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit

Follow Lee on X/Twitter - Father, Husband, Serial builder creating AI, crypto, games & web tools. We are friends :) AI Will Come To Life!

Check out: eBank.nz (Art Generator) | Netwrck.com (AI Tools) | Text-Generator.io (AI API) | BitBank.nz (Crypto AI) | ReadingTime (Kids Reading) | RewordGame | BigMultiplayerChess | WebFiddle | How.nz | Helix AI Assistant