[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] A layered transport
wait... what?
What is this front tier?
Why would we want to use cryptographic protocols for bridges that
violate the end to end principal?
On Mon, Oct 26, 2015 at 8:44 AM, Da Feng <sunspiderx@xxxxxxxxx> wrote:
> Hi:
> I've discovered that the GFW normally doesn't block https
> protocols. We can use a https front tier to distribute connections to
> actual bridges. The front tier encrypts an internal address identifier
> with its private key (no matching public key or public algorithm) and
> returns to user the encrypted identifier, part of which also includes
> the user's chosen password. Then when submitting requests, the user
> encrypt again with his password the items such as his timestamp,
> broswer headers. The request line to https server is no different from
> an ordinary one and include both the user encrypted item and front
> tier encrypted item. After the connection is established, data is
> relayed inside https between bridge and user.
> _______________________________________________
> tor-dev mailing list
> tor-dev@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev