X

Tor anonymity project looks to help Iranians sidestep Net ban

Tor's "obfsproxy" technology would make encrypted data look innocuous and let it dodge government censors. That could help citizens in Iran reach blocked sites as antigovernment protests reportedly loom.

Edward Moyer Senior Editor
Edward Moyer is a senior editor at CNET and a many-year veteran of the writing and editing world. He enjoys taking sentences apart and putting them back together. He also likes making them from scratch. ¶ For nearly a quarter of a century, he's edited and written stories about various aspects of the technology world, from the US National Security Agency's controversial spying techniques to historic NASA space missions to 3D-printed works of fine art. Before that, he wrote about movies, musicians, artists and subcultures.
Credentials
  • Ed was a member of the CNET crew that won a National Magazine Award from the American Society of Magazine Editors for general excellence online. He's also edited pieces that've nabbed prizes from the Society of Professional Journalists and others.
Edward Moyer
2 min read
 

The privacy-focused Tor Project is working on helping Iranians sidestep increased Internet restrictions that were put in place by the country's government today in anticipation of protests this weekend.

Antigovernment protests are reportedly planned for Saturday--the 33rd anniversary of the Islamic revolution that toppled the Shah. In response, the government has blocked access to Web-based e-mail services such as Gmail and social networks like Facebook. Officials have also, reports Forbes' Andy Greenberg, cut Web traffic that takes advantage of the kind of encryption used by secure e-mail services and social networks.

That's where U.S.-based Tor comes in, says Greenberg. The project, which is devoted to providing a system that lets people use the Internet anonymously, is developing a method for disguising encrypted connections as innocuous, unencrypted ones.

The idea is to "make your Ferrari look like a Toyota by putting an actual Toyota shell over the Ferrari," Tor executive director Andrew Lewman told Greenberg.

The Iranian government uses deep packet inspection filters to locate and block data encrypted using the Secure Sockets Layer and Transport Layer Security protocols, Greenberg reports. SSL and TLS are used for private communications. Tor users also tap the protocols to reach "bridge" connections that in turn let them reach the Tor network, which can give them access to blocked sites.

Tor's "obfsproxy," or obfuscated proxy, project would let SSL and TLS data masquerade as data sent using an innocuous protocol such as the Extensible Messaging and Presence Protocol used for instant messaging.

"Obfsproxy should start up, you choose XMPP, and obfsproxy should emulate XMPP to the point where even a sophisticated device cannot find anything suspicious," Lewman told Greenberg.

Greenberg reports that, according to Lewman, obfsproxy is in "superalpha" and could well be figured out by Iran's government before too long. But the technology is currently working well inside the country.

The Tor Project is asking for tech-savvy volunteers to lend a hand with obfsproxy. Greenberg reports that between 50,000 and 60,000 people use Tor daily in Iran.