[tor-bugs] #5282 [Tor Browser]: Randomize non-pipelined requests to defend against traffic fingerprinting
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Mar 1 02:16:26 UTC 2012
#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------+--------------------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: defect | Status: new
Priority: major | Milestone: TorBrowserBundle 2.3.x-stable
Component: Tor Browser | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
According to Martin Henze (who works with Andriy Panchenko), the defense
in #3914 is inadequate due to the fact that many sites forcibly disable
pipelining.
He implemented a defense that randomizes non-pipelined HTTP requests as
well, but it may need some cleanup. It also needs testing against their
framework still, I believe.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list