[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #2697 [Torflow]: Detect exit nodes running 'transparent' HTTP proxies



#2697: Detect exit nodes running 'transparent' HTTP proxies
-------------------------+--------------------------------------------------
 Reporter:  rransom      |          Owner:  mikeperry
     Type:  enhancement  |         Status:  new      
 Priority:  critical     |      Milestone:           
Component:  Torflow      |        Version:           
 Keywords:               |         Parent:           
   Points:               |   Actualpoints:           
-------------------------+--------------------------------------------------
 One Tor exit node operator has [https://lists.torproject.org/pipermail
 /tor-talk/2011-March/019773.html stated that he intends to route Tor exit
 node traffic through a 'transparent' HTTP proxy], and that this HTTP proxy
 would censor non-HTTP traffic on port 80 (including SSL/TLS).  The exit
 scanner should be improved to detect exit nodes that divert port 80
 traffic through a censoring proxy so that they can be promptly marked with
 the !BadExit flag.

 Connecting to an SSL/TLS server running on port 80 should be enough to
 detect many of these hostile exit nodes, but we should eventually add more
 subtle/thorough detection methods (e.g. sending an HTTP request in which
 the Host HTTP header does not match the TCP address which the Tor exit
 node was told to connect to).

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2697>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs