[tor-bugs] #2697 [Torflow]: Detect exit nodes running 'transparent' HTTP proxies

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu Mar 10 01:20:22 UTC 2011


#2697: Detect exit nodes running 'transparent' HTTP proxies
-------------------------+--------------------------------------------------
 Reporter:  rransom      |          Owner:  mikeperry
     Type:  enhancement  |         Status:  new      
 Priority:  critical     |      Milestone:           
Component:  Torflow      |        Version:           
 Keywords:               |         Parent:           
   Points:               |   Actualpoints:           
-------------------------+--------------------------------------------------

Comment(by rransom):

 Replying to [comment:1 mikeperry]:
 > Do we want to automatically BadExit all nodes running upstream
 transproxies?

 If we detect them, yes.

 The techniques I described above will only detect proxies that are
 noticeably mangling user traffic.

 > We already do detect censorship of exploit info by AV systems. We can
 try to focus this by running an exit scanner specifically scraping
 computer security and exploit related search queries. That would probably
 get anyone running a dumb IDS censor like snort.

 That sounds like a Good Thing to add to the exit scanner (if it's not
 there already), but I would also like to detect exit nodes that are (for
 example) accidentally censoring or redirecting traffic as a side effect of
 running an HTTP request logger and/or password sniffer.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2697#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list