[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #25594 [Obfuscation/Snowflake]: Broker: investigate non-domain-fronting secure client / proxy registrations
#25594: Broker: investigate non-domain-fronting secure client / proxy registrations
-----------------------------------+------------------------
Reporter: arlolra | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Obfuscation/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------+------------------------
Comment (by arma):
Can somebody summarize the requirements for the interaction between the
Snowflake client and ~~the broker~~whatever components the client has to
talk to?
I see mentions of a TLS handshake above, but I'm hoping to get at the
underlying requirements, for which "do a TLS handshake" is part of one
possible approach to meeting the requirements, but once we understand the
requirements more maybe we'll realize there are others.
In particular, does it have to be an arbitrary number of round-trip
interactions (e.g. because we're bundling info from a nat piercing
protocol that needs arbitrary round-trips) or can we constraint it down
more?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25594#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs