[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #5282 [Tor Browser]: Randomize non-pipelined requests to defend against traffic fingerprinting



#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------+--------------------------------------------------
 Reporter:  mikeperry    |          Owner:  mikeperry                    
     Type:  defect       |         Status:  new                          
 Priority:  major        |      Milestone:  TorBrowserBundle 2.3.x-stable
Component:  Tor Browser  |        Version:                               
 Keywords:               |         Parent:                               
   Points:               |   Actualpoints:                               
-------------------------+--------------------------------------------------
 According to Martin Henze (who works with Andriy Panchenko), the defense
 in #3914 is inadequate due to the fact that many sites forcibly disable
 pipelining.

 He implemented a defense that randomizes non-pipelined HTTP requests as
 well, but it may need some cleanup. It also needs testing against their
 framework still, I believe.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs