Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Tor, Ultrasurf, HSS, VPNs no longer working in Syria?

Marcin de Kaminski marcin.dekaminski at gmail.com
Thu Dec 1 08:44:46 PST 2011


Yeah, being a part of Telecomix I am most aware of that. The tech crew is
informed about this and are trying to resolve what issues there might be
and possible solutions for this.

Still, new input is always needed and i am most thankful for the
information provided here. :-)

/Marcin
Den 1 dec 2011 17:38 skrev "Collin Anderson" <collin at averysmallbird.com>:

> The best source of information on this is likely Telecomix. For a few
> months, they have had a number of contacts in Syria, with whom they've
> struggled to keep online.
>
> From my conversations with members, issues with PPTP/L2TP/IPSEC and,
> more importantly, OpenVPN, arose in September. The last I had asked,
> they were attempting to use Stunnel to mask VPN, but the larger theory
> was that if an SSL connection was made, some system would check to see
> if a valid HTTPS server was on the other side. It's also interesting
> to point out that the Blue Coat logs document a fairly uninterrupted
> stream Tor traffic as of August.
>
> --
> Collin David Anderson
> averysmallbird.com | @cda | Washington, D.C.
>
>
> On Thu, Dec 1, 2011 at 11:06 AM,  <liberationtech at lewman.us> wrote:
> > On Thu, Dec 01, 2011 at 10:14:38AM +0100, admin at alkasir.com wrote 2.5K
> bytes in 69 lines about:
> > : I've been in touch with a friend in Syria and he said that none of the
> > : prominent anonymizing tools are working in Syria. Can you verify this
> > : information? I was told all major VPN protocols are also not working,
> > : including PPTP, L2TP, IPSec, SSL. SSH tunnels apparently get
> disconnected
> > : every few minutes by apparent interventions that require the client to
> > : reconnect every so often, making browsing a nightmare.
> >
> > Which connection they are using may matter. So, here come my
> > questions: Which ISP? Has Syria re-enabled ssl interception (aka
> > machine-in-the-middle)? What does a user see? Does the browser warn
> > about fake certs? What does Tor report in its log file?
> >
> > etc, etc, etc.
> >
> > --
> > Andrew
> > pgp key: 0x74ED336B
> > _______________________________________________
> > liberationtech mailing list
> > liberationtech at lists.stanford.edu
> >
> > Should you need to change your subscription options, please go to:
> >
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >
> > If you would like to receive a daily digest, click "yes" (once you click
> above) next to "would you like to receive list mail batched in a daily
> digest?"
> >
> > You will need the user name and password you receive from the list
> moderator in monthly reminders.
> >
> > Should you need immediate assistance, please contact the list moderator.
> >
> > Please don't forget to follow us on http://twitter.com/#!/Liberationtech
> _______________________________________________
> liberationtech mailing list
> liberationtech at lists.stanford.edu
>
> Should you need to change your subscription options, please go to:
>
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
> If you would like to receive a daily digest, click "yes" (once you click
> above) next to "would you like to receive list mail batched in a daily
> digest?"
>
> You will need the user name and password you receive from the list
> moderator in monthly reminders.
>
> Should you need immediate assistance, please contact the list moderator.
>
> Please don't forget to follow us on http://twitter.com/#!/Liberationtech
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20111201/5739ce35/attachment.html>


More information about the liberationtech mailing list