[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5282 [Firefox Patch Issues]: Randomize non-pipelined requests to defend against traffic fingerprinting



#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------------------+--------------------------------------
    Reporter:  mikeperry             |       Owner:  mikeperry                    
        Type:  defect                |      Status:  closed                       
    Priority:  major                 |   Milestone:  TorBrowserBundle 2.3.x-stable
   Component:  Firefox Patch Issues  |     Version:                               
  Resolution:  fixed                 |    Keywords:  MikePerry201204              
      Parent:                        |      Points:  4                            
Actualpoints:  12                    |  
-------------------------------------+--------------------------------------
Changes (by mikeperry):

  * status:  needs_review => closed
  * points:  => 4
  * resolution:  => fixed
  * actualpoints:  => 12


Comment:

 Ok, this is all set and merged. I had to alter the patch a bit to ensure
 request randomization. I also pinged Henze and Panchenko with the updated
 version.

 I also looked into the SPDY spec briefly. It has the ability to store
 arbitrary state in the browser.. We'll want to neuter that, as well as
 reduce its insanely long keepalive duration. I have not put deep thought
 into how to do request randomization or stream limiting in spdy, though
 (or if it is really beneficial anymore in the face of the ultra-efficient
 request pipelining).

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs