Delivery-Date: Sat, 20 Jun 2015 22:30:30 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.7 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	FROM_LOCAL_NOVOWEL,RCVD_IN_DNSWL_MED,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BF11E1E04C1;
	Sat, 20 Jun 2015 22:30:28 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id F1B46356FC;
	Sun, 21 Jun 2015 02:30:22 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3CE8D354BC
 for <tor-talk@lists.torproject.org>; Sun, 21 Jun 2015 02:30:19 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id oMPZqUrYsACf for <tor-talk@lists.torproject.org>;
 Sun, 21 Jun 2015 02:30:19 +0000 (UTC)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19])
 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id E574835458
 for <tor-talk@lists.torproject.org>; Sun, 21 Jun 2015 02:30:18 +0000 (UTC)
Received: from [192.168.2.60] ([99.190.181.188]) by mail.gmx.com (mrgmx003)
 with ESMTPSA (Nemesis) id 0MO7ee-1Z9ow70ZAS-005cu2 for
 <tor-talk@lists.torproject.org>; Sun, 21 Jun 2015 04:30:15 +0200
Message-ID: <558621B3.7000403@gmx.com>
Date: Sat, 20 Jun 2015 21:30:11 -0500
From: Joe Btfsplk <joebtfsplk@gmx.com>
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64;
 rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <5584E032.6060001@gmx.com>
 <1434800149.26545.13.camel@larsluthman.net>
In-Reply-To: <1434800149.26545.13.camel@larsluthman.net>
X-Provags-ID: V03:K0:yvjKk30b7UKlfxdqpDHNfwh36Vy6j6A++2vS2gxYZB7HCT2UJIu
 yg2PseA1soM3l5a+qw2ZlSA2xAZnK6yBaJaAc/h06ULDGa9kAD2XAHk1L9GQE0TsVsZQ+zV
 zC0JoXPs/6sdLCt/o0od2Zi+9htbRko7mR8u9z9gxqtnDW+gq122DTF5eq4B3dc0bt8KSl2
 otntg+c3I9CmC/3fKoCrA==
X-UI-Out-Filterresults: notjunk:1;V01:K0:C59pLCjgqZg=:6bOCC31QnewEgN0C3ZYSpm
 KzgKPG48jTnwC/IadshB6tFgpNjzE1C7hzH8JPQNMC7FAk6XKyu+X5Lil5newj0GipSf6jWj7
 UFHwIYTziwysJKBARdX21q03pW8RGZ8SHWZfpoy4rbeXnrgA+duhsqj2WVEHSaMrKDr/NIOUu
 GR60OtWIpwzWBM4mBByLD5z7/pBFiEmK01O/pHa8xiIOqNstNaMSZ3sRkQKEO1t2ffuhYIK6Z
 5wmyCi6GQMHqQSE5VVGhUzVSFIFHqZ6qC1nENj8cXCTjrSc3ZBSOgzRdSf8lyyDJ5+v4I9a1s
 Hr58Eci740AXNzKs51NFk1hM9CTQnsxaTw/ndMdcrVrZhXttyVf+gYmt6ARVvszoMY/z9Xf9h
 sA4Uu6x9QhyL8SWgMHBxQS9tew6xyypaHvzjPIobtEkOzSMhikDVO1LTtxXbp2NSwuqV7X835
 SwsCoTjgpqNhngyCNkyBnyGtyhd2w2gYFxV4mjb/B7CFdQY9DmAqiO6IGPDoJGvO4DvVZ0Uyh
 eFD+hmCh428f2DYSad4qTxqoBXaKml91NCJ91G5AJwLMox87J/2UAbnwK8yCMWP4mX4AL5u+i
 z2yogcYUvShFa2QqhSB4A5JGWsKoDeR61f4Ai0McwoVBpZw1LGdgOUzWwQNQxZQ27mqlZATyU
 ZFPydODKTIDRESRtyDzMDC+fXtRsxN+NCswdQMth0bCjAkIocMVAzh6UUBJnu61RfcRQ=
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] do Cloudfare captchas ever work?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Just to clarify (to all that replied) - I have JS enabled.  At least, 
when trying to get captchas to work.
Then, I'm using Tor Browser's default settings for NoScript.

I just tried a couple of sites w/ Cloudfare.
Today, it worked, but not on the 1st try - even with legible house numbers.
But today I also checked the exit relay country, when it worked.  It was 
in a "well behaved" European country.

Other times when Cloudfare didn't work, I didn't always think to check, 
to see if there's any pattern to Cloudfare not working & specific exit 
relay countries.

FYI - for others, when using _vanilla Firefox_ & AdBlock Plus (or 
similar), Cloudfare doesn't like it.  Even if NoScript is set to allow 
all scripts.
Maybe because of blocking ads, but also maybe because ABP blocks some 
scripts.  Depending on the target site, some of those may be 3rd party 
scripts (for CDNs, or....) that Cloudfare requires to be allowed, before 
they'll allow the captcha to work.


On 6/20/2015 6:35 AM, Lars Luthman wrote:
> On Fri, 2015-06-19 at 22:38 -0500, Joe Btfsplk wrote:
>> Does anyone have any meaningful success rate with Cloudfare captchas in
>> Tor Browser?
>>
>> Using default browser installation & settings?
>> I so  rarely have success, that I immediately close tabs for sites
>> presenting Cloudfare.
>> Even when the puzzle is clearly legible (rarely), it still doesn't work.
>> Not for me - with default TBB settings or even allowing 1st party
>> cookies from the target site.
>>
>> If others have even partial success, what's the secret?
>> Getting a different exit relay/ exit country / exit IPa?
> That's the only way that ever works for me. Or turning Javascript on,
> but I don't want to do that for HTTP sites.
>
> With Javascript on you usually get easier captchas that often let you
> through when you get them right. With Javascript off you get the
> captchas that look like the names of Lovecraftian deities distorted
> through non-Euclidean geometries that are difficult even for us humans
> to solve, and even when you definitely solve them you aren't allowed
> through but just get presented with another captcha, and another, and
> another, ad infinitum.
>
> Switching to different exits helps, but you often have to switch 10 - 20
> times in a row before you hit an exit relay that Cloudflare in their
> benevolent wisdom has deemed good enough to be allowed to view the web.
> And even then you usually just get a few minutes before the gate is
> slammed shut and you're back with the captchas.
>
> I suspect that the new exit-switching feature in Tor Browser has made it
> slightly worse by putting more load on the few exits that are allowed
> through at any given time, making it more likely that Cloudflare will
> think it's some sort of DoS attack or automated scraper and block it.
> Cloudflare has essentially broken the web for Tor users.
>
> For some reason web proxies like hidemyass.com never seem to be blocked
> by Cloudflare so one (annoying) solution is to use one of those with Tor
> Browser.
>
>
> --ll
>
>

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

