[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #2697 [Torflow]: Detect exit nodes running 'transparent' HTTP proxies
#2697: Detect exit nodes running 'transparent' HTTP proxies
-------------------------+--------------------------------------------------
Reporter: rransom | Owner: mikeperry
Type: enhancement | Status: new
Priority: critical | Milestone:
Component: Torflow | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by rransom):
Replying to [comment:1 mikeperry]:
> Do we want to automatically BadExit all nodes running upstream
transproxies?
If we detect them, yes.
The techniques I described above will only detect proxies that are
noticeably mangling user traffic.
> We already do detect censorship of exploit info by AV systems. We can
try to focus this by running an exit scanner specifically scraping
computer security and exploit related search queries. That would probably
get anyone running a dumb IDS censor like snort.
That sounds like a Good Thing to add to the exit scanner (if it's not
there already), but I would also like to detect exit nodes that are (for
example) accidentally censoring or redirecting traffic as a side effect of
running an HTTP request logger and/or password sniffer.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2697#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs