[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26425 [Core Tor/Tor]: Add functionality to set SNI for client connections
#26425: Add functionality to set SNI for client connections
--------------------------+-----------------------------------
Reporter: twim | Owner: (none)
Type: enhancement | Status: needs_information
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: asn | Sponsor:
--------------------------+-----------------------------------
Comment (by arma):
What about a design where Tor has a pool of 20 SNIs, and chooses between
them, as its default behavior?
Or it flips a coin and either picks an SNI from the pool, or fabricates a
fake one like the current behavior.
Neither of those strategies will make Tor traffic blend in particularly
well, but both of them would let a user behind twim's firewall use Tor
out-of-the-box.
(I guess they could both help with fingerprinting Tor in other ways
though? Like, "find out if the domain they claim to be going to is
associated with that other IP address". But, "that domain they claim to be
going to doesn't even resolve" is a pretty strong indicator as it is.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26425#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs