[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] TCP Stealth - Improved Kernel-Based Port-Knocking in Linux




Hi,

This work could be of interest for the TOR project.
https://gnunet.org/sites/default/files/ma_kirsch_2014.pdf

Quote:
"TCP Stealth replaces the traditional random TCP SQN number with a token
that authenticates the client and (optionally) the first bytes of the TCP
payload. Clients and servers can enable TCP Stealth by explicitly setting
a socket option or linking against a library that wraps existing network
system calls."

"Finally, applications that try to enable users to cicrumvent censorship âsuch as Tor bridges [5]â may want to hide their existence from scans by censors."
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk