[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #25594 [Obfuscation/Snowflake]: Broker: investigate non-domain-fronting secure client / proxy registrations
#25594: Broker: investigate non-domain-fronting secure client / proxy registrations
-----------------------------------+------------------------
Reporter: arlolra | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Obfuscation/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------+------------------------
Comment (by dcf):
An idea to use DNS over HTTPS:
https://groups.google.com/forum/#!topic/traffic-obf/ZQohlnIEWM4
> The circumvention idea is to take any existing DNS tunneling scheme and
send it through DNS over HTTPS. To be a bit more specific: you send
recursive DNS queries (encoding your upstream traffic) to the DNS-over-
HTTPS server, which then forwards the queries to another specialized
server that decodes them and proxies the data they contain.
>
> Even if not a general-purpose transport, DNS-over-HTTPS could be an
ideal rendezvous mechanism for a system like Snowflake or Moat. One where
you only need to send/receive a small amount of very hard-to-block data in
order to bootstrap a connection.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25594#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs