[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7200 [Tor]: Implement restored semantics of TLS ClientHello



#7200: Implement restored semantics of TLS ClientHello
--------------------------------+-------------------------------------------
 Reporter:  karsten             |          Owner:                    
     Type:  project             |         Status:  needs_review      
 Priority:  normal              |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor                 |        Version:                    
 Keywords:  SponsorZ tor-relay  |         Parent:                    
   Points:                      |   Actualpoints:                    
--------------------------------+-------------------------------------------

Comment(by nickm):

 If [http://www.imperialviolet.org/2010/12/21/eccspeed.html agl's numbers]
 are right, P224 would be much faster than P256, and secure enough for us.
 But before we get too deep there, we need to check what (if anything) our
 choice of curve will do to fingerprintability here, or whether our choice
 of ECDHE ciphers at all will make us fingerprintable.  In the latter case,
 maybe bridges should disable them by default when not using a pluggable
 transport.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7200#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs