[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4744 [Tor Bridge]: GFW probes based on Tor's SSL cipher list
#4744: GFW probes based on Tor's SSL cipher list
--------------------------------+-------------------------------------------
Reporter: asn | Owner: nickm
Type: defect | Status: needs_revision
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Bridge | Version:
Keywords: tls fingerprinting | Parent: #4185
Points: | Actualpoints:
--------------------------------+-------------------------------------------
Comment(by nickm):
Replying to [comment:16 hellais]:
>
> > * The patch should probably remove ciphers.inc as unused.
>
> I was thinking that probably there isn't a lot of benefit of being able
to compile your Tor with a different set of ciphers to use and maybe it
could be best to simply replace ciphers.inc with the FF ciphers.
That's fine by me.
> The goal of this is to avoid Tor being distiguishable based on the
ciphers it advertises, maybe we should just keep our cipher set up to date
with what is the current mainstream browser.
>
> This process of "updating" the cipher suite should be automatized and
read it from the FF or Chrome source code.
Sounds good. We should document (in the code) the process and script we
use to do that? Can you do that easily, or should I look into it?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4744#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs