[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-------------------------+-------------------------------------------------
Reporter: | Owner: (none)
Aphrodites1995 |
Type: enhancement | Status: new
Priority: Medium | Component: Circumvention/Censorship
| analysis
Version: | Severity: Normal
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------+-------------------------------------------------
According to https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf
, the GFW only injects packets, mostly TCP RST signals. What if TOR has
bridges/servers that do not respond to TCP RST? This would render the
connection interfering part of GFW useless. Here, a connection ends only
when both sides send a "END" signal to the other side with their private
key for the connection only that is shared through the connection. We
don't even need to obfuscate TOR traffic anymore as the packets are not
blocked. With the DNS inspection, we could have IPs for bridges/servers,
which do the DNS queries on non censored DNS servers.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs