[tor-bugs] #5282 [Firefox Patch Issues]: Randomize non-pipelined requests to defend against traffic fingerprinting

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Apr 18 19:54:40 UTC 2012


#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------------------+--------------------------------------
    Reporter:  mikeperry             |       Owner:  mikeperry                    
        Type:  defect                |      Status:  closed                       
    Priority:  major                 |   Milestone:  TorBrowserBundle 2.3.x-stable
   Component:  Firefox Patch Issues  |     Version:                               
  Resolution:  fixed                 |    Keywords:  MikePerry201204              
      Parent:                        |      Points:  4                            
Actualpoints:  12                    |  
-------------------------------------+--------------------------------------
Changes (by mikeperry):

  * status:  needs_review => closed
  * points:  => 4
  * resolution:  => fixed
  * actualpoints:  => 12


Comment:

 Ok, this is all set and merged. I had to alter the patch a bit to ensure
 request randomization. I also pinged Henze and Panchenko with the updated
 version.

 I also looked into the SPDY spec briefly. It has the ability to store
 arbitrary state in the browser.. We'll want to neuter that, as well as
 reduce its insanely long keepalive duration. I have not put deep thought
 into how to do request randomization or stream limiting in spdy, though
 (or if it is really beneficial anymore in the face of the ultra-efficient
 request pipelining).

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list