[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #3914 [Tor Browser]: Experimental Website fingerprinting defense
#3914: Experimental Website fingerprinting defense
---------------------------------------------+------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor Browser | Version:
Keywords: MikePerryIterationFires20110911 | Parent:
Points: | Actualpoints:
---------------------------------------------+------------------------------
Comment(by mikeperry):
The patch will have two parameters, which I am going to just hardcode in
for now, but if anyone shows any interest in testing various values I can
pretty easily convert them to about:config prefs.
maxrequests - the maximum number of requests to put into a pipeline
minrequests - the minimum number of requests to put into a pipeline
These are set right now to 12 and 4, respectively. There is a uniform
distribution among the queue sizes between these two values. The request
ordering should be randomized amongst all currently pending requests on a
connection.
There are routinely enough requests to create 12-request pipelines. It is
possible we could raise this value much higher (though there is a static
compiled-in limit).
I think this one stands a decent chance of working with the right
parameters, if the torified HTTP pipeline ends up behaving like I expect
on the wire. But I could be wrong?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3914#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs