[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #33010 [Metrics/Exit Scanner]: Monitor cloudflare captcha rate: do a periodic onionperf-like query to a cloudflare-hosted static site



#33010: Monitor cloudflare captcha rate: do a periodic onionperf-like query to a
cloudflare-hosted static site
----------------------------------+------------------------------
 Reporter:  arma                  |          Owner:  metrics-team
     Type:  task                  |         Status:  new
 Priority:  Medium                |      Milestone:
Component:  Metrics/Exit Scanner  |        Version:
 Severity:  Normal                |     Resolution:
 Keywords:  network-health        |  Actual Points:
Parent ID:                        |         Points:
 Reviewer:                        |        Sponsor:
----------------------------------+------------------------------

Comment (by cypherpunks):

 >One catch is that Cloudflare currently gives alt-svc headers in response
 to fetches from Tor addresses. So that means we need a web client that can
 follow alt-srv headers -- maybe we need a full Selenium like client?
 Tor Browser does not upgrade immediately, so that's not too much reason to
 use real web browser. However, Cloudflare is doing fingerprinting of TLS
 handshake Client Hello (cipher suites and group in tls 1.3) to tell real
 Tor Browser from spoofed. Must build curl from NSS and set correct headers
 and cipher suites to pass.

 Cloudflare have also different levels of protection, and some
 grandfathered protection levels have no Tor Browser whitelisting. Should
 test them all.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33010#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs