[tor-bugs] #5548 [Tor Bridge]: Write a proposal for using a front-end proxy like apache for bridge scanning resistance

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Apr 24 17:29:40 UTC 2012


#5548: Write a proposal for using a front-end proxy like apache for bridge
scanning resistance
------------------------+---------------------------------------------------
 Reporter:  karsten     |          Owner:  nickm                  
     Type:  project     |         Status:  new                    
 Priority:  normal      |      Milestone:  Sponsor F: July 1, 2012
Component:  Tor Bridge  |        Version:                         
 Keywords:              |         Parent:                         
   Points:              |   Actualpoints:                         
------------------------+---------------------------------------------------

Comment(by asn):

 Some more questions:

 a) Can this scheme work without changing the tor codebase at all?

 It seems that with Shane's scheme, the server-side Apache can work
 independently from the tor bridge (if auth succeeds, port is forwarded. if
 auth fails, apache logs, tor never learns about the client.).

 Can we also do the same for the client-side by letting a specialised
 external program connect to the bridge, do the auth, see if it succeeds or
 fails, and forward ports accordingly?

 Also, do we actually want to do this out of the tor codebase? It will be a
 cleaner implementation for sure, but we might also lose the benefits of
 tor knowing about failed attempts etc. (for example, maybe Apache should
 report to tor that ''client at IP:PORT failed at auth. I presented him
 webpage X for camouflage'')

 b) What happens if auth fails in this scheme? Do we simply give the prober
 an Apache "It works" page for index.html, and 404 for everything else? Do
 we randomly generate webpages by using something similar to bananaphone?
 Do we randomly (using the GET request as a seed) select an Alexa 1million
 site (or a twitter feed) and proxy it? Or do we do something else?

 I would say that the first solution seems like a good beginning step; it's
 trivial to implement (just let apache do its job) and it doesn't expose
 too many fingerprints. On the other hand, the other solutions, while more
 sophisticated and advanced, have lots of technical problems and are harder
 to implement.

 BTW, b) might be out of scope for this ticket, but it's still useful to
 think about.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5548#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list