[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26425 [Core Tor/Tor]: Add functionality to set SNI for client connections



#26425: Add functionality to set SNI for client connections
--------------------------+-----------------------------------
 Reporter:  twim          |          Owner:  (none)
     Type:  enhancement   |         Status:  needs_information
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:  asn           |        Sponsor:
--------------------------+-----------------------------------

Comment (by arma):

 What about a design where Tor has a pool of 20 SNIs, and chooses between
 them, as its default behavior?

 Or it flips a coin and either picks an SNI from the pool, or fabricates a
 fake one like the current behavior.

 Neither of those strategies will make Tor traffic blend in particularly
 well, but both of them would let a user behind twim's firewall use Tor
 out-of-the-box.

 (I guess they could both help with fingerprinting Tor in other ways
 though? Like, "find out if the domain they claim to be going to is
 associated with that other IP address". But, "that domain they claim to be
 going to doesn't even resolve" is a pretty strong indicator as it is.)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26425#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs