[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #14937 [Tor Browser]: Get meek working in Tor Circuit Display
#14937: Get meek working in Tor Circuit Display
-------------------------+-------------------------------------------------
Reporter: | Owner: arthuredelstein
arthuredelstein | Status: needs_review
Type: defect | Milestone:
Priority: normal | Version:
Component: Tor | Keywords: tbb-circuit-display, tbb-usability,
Browser | tbb-4.5-alpha, TorBrowserTeam201503R,
Resolution: | GeorgKoppen201503R
Actual Points: | Parent ID:
Points: |
-------------------------+-------------------------------------------------
Comment (by arthuredelstein):
Replying to [comment:27 dcf]:
> Oh, hrm, the Globe fingerprints are hashed fingerprints because they are
bridge relays.
>
> meek-google: !46d4a71197b8fa515a826c6b017c522fe264655b
> meek-amazon: !4ee0cc769eb4b15a872f742ede27d298a59dcade
> meek-azure: !a2c13b7dfcab1cbf3a884b6eb99a98067ab6ef44
>
> I didn't do anything special to get these, only watched the terminal as
I connected to them (`tor -f torrc` in the meek-client directory):
> {{{
> Mar 21 14:28:18.000 [notice] Learned fingerprint
46D4A71197B8FA515A826C6B017C522FE264655B for bridge 0.0.2.0:1 (with
transport 'meek').
> Mar 21 14:28:16.000 [notice] Learned fingerprint
4EE0CC769EB4B15A872F742EDE27D298A59DCADE for bridge 0.0.2.0:2 (with
transport 'meek').
> Mar 21 14:28:13.000 [notice] Learned fingerprint
A2C13B7DFCAB1CBF3A884B6EB99A98067AB6EF44 for bridge 0.0.2.0:3 (with
transport 'meek').
> }}}
>
> Here's the fingerprint hashing algorithm if you want to check that they
correspond to what was posted earlier.
> {{{
> >>> import hashlib
> >>>
hashlib.sha1("46D4A71197B8FA515A826C6B017C522FE264655B".decode("hex")).digest().encode("hex")
> '88f745840f47ce0c6a4fe61d827950b06f9e4534'
> >>>
hashlib.sha1("4EE0CC769EB4B15A872F742EDE27D298A59DCADE".decode("hex")).digest().encode("hex")
> '3fd131b74d9a96190b1ee5d31e91757fada1a4f3'
> >>>
hashlib.sha1("A2C13B7DFCAB1CBF3A884B6EB99A98067AB6EF44".decode("hex")).digest().encode("hex")
> 'aa033eeb61601b2b7312d89b62aaa23dc3ed8a34'
> }}}
Thanks, David! That fixes it. Are there a similar set of fingerprints we
can use for flashproxy?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14937#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs