[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7145 [Tor]: Evaluate, possibly revise, and then implement ideas for TLS certificate normalization



#7145: Evaluate, possibly revise, and then implement ideas for TLS certificate
normalization
---------------------------------+------------------------------------------
 Reporter:  karsten              |          Owner:                    
     Type:  project              |         Status:  new               
 Priority:  normal               |      Milestone:  Tor: 0.2.5.x-final
Component:  Tor                  |        Version:                    
 Keywords:  SponsorZ tor-client  |         Parent:                    
   Points:                       |   Actualpoints:                    
---------------------------------+------------------------------------------

Comment(by nickm):

 I think the "easy part of 195" that I want to do for the end-of-feb
 deliverable is:
   * #4550 -- allow user-specified link certificates.
 Once that's done, it provides a way for bridge operators to avoid
 fingerprinting based on validity times and intervals '''and'' to avoid
 fingerprinting based on DN strings.

 Additionally, I want to let clients set their own cipher lists, so long as
 they include at least RSA-AES-128-EDH or RSA-AES-256-EDH.

 I believe I can get a branch coded here tonight and tomorrow.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7145#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs