[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17025 [BridgeDB]: use private messaging functions on websites that will not get blocked to deliver bridges
#17025: use private messaging functions on websites that will not get blocked to
deliver bridges
-----------------------------+------------------
Reporter: elypter | Owner: isis
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: BridgeDB | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-----------------------------+------------------
Comment (by elypter):
ehilethis is probably not going to happen anytime soon there is the
possibility that a censor uses dns to ridirect to their own server which
then censors the Host header and redirects other traffic to the original
host.
then domainless fronting would still be possible but only if the censor
isnt desperate enough to do a man in the middle attack on connections
without sni. (assuming this paper is correct
https://www.bamsoftware.com/papers/fronting/ i didnt really understand why
the domainless variant cant have a fake sni)
if the actual service of a website is being used then it would be
impossible to block it without blocking the site
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17025#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs