[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #4436 [Tor Bridge]: Bridges should be able to disable v1 and v2 link handshakes
#4436: Bridges should be able to disable v1 and v2 link handshakes
------------------------+---------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor Bridge | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
There is no point in implementing scanning resistance and all that fancy
stuff, if censors can make a bridge perform the fingerprintable v1/v2 link
handshakes by adding a few ciphers to ClientHello, or renegotiating right
after TLS.
There should be a way to disable v1 and v2 link handshakes before we
implement scanning resistance stuff.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4436>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs