[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #4436 [Tor Bridge]: Bridges should be able to disable v1 and v2 link handshakes



#4436: Bridges should be able to disable v1 and v2 link handshakes
------------------------+---------------------------------------------------
 Reporter:  asn         |          Owner:     
     Type:  defect      |         Status:  new
 Priority:  normal      |      Milestone:     
Component:  Tor Bridge  |        Version:     
 Keywords:              |         Parent:     
   Points:              |   Actualpoints:     
------------------------+---------------------------------------------------
 There is no point in implementing scanning resistance and all that fancy
 stuff, if censors can make a bridge perform the fingerprintable v1/v2 link
 handshakes by adding a few ciphers to ClientHello, or renegotiating right
 after TLS.

 There should be a way to disable v1 and v2 link handshakes before we
 implement scanning resistance stuff.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4436>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs