[tor-bugs] #5282 [Tor Browser]: Randomize non-pipelined requests to defend against traffic fingerprinting

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu Mar 1 02:16:26 UTC 2012


#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------+--------------------------------------------------
 Reporter:  mikeperry    |          Owner:  mikeperry                    
     Type:  defect       |         Status:  new                          
 Priority:  major        |      Milestone:  TorBrowserBundle 2.3.x-stable
Component:  Tor Browser  |        Version:                               
 Keywords:               |         Parent:                               
   Points:               |   Actualpoints:                               
-------------------------+--------------------------------------------------
 According to Martin Henze (who works with Andriy Panchenko), the defense
 in #3914 is inadequate due to the fact that many sites forcibly disable
 pipelining.

 He implemented a defense that randomizes non-pipelined HTTP requests as
 well, but it may need some cleanup. It also needs testing against their
 framework still, I believe.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list