[tor-bugs] #4744 [Tor Bridge]: GFW probes based on Tor's SSL cipher list

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Mar 13 03:01:43 UTC 2012


#4744: GFW probes based on Tor's SSL cipher list
--------------------------------+-------------------------------------------
 Reporter:  asn                 |          Owner:  nickm             
     Type:  defect              |         Status:  needs_revision    
 Priority:  major               |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge          |        Version:                    
 Keywords:  tls fingerprinting  |         Parent:  #4185             
   Points:                      |   Actualpoints:                    
--------------------------------+-------------------------------------------

Comment(by nickm):

 Replying to [comment:16 hellais]:
 >
 > >   * The patch should probably remove ciphers.inc as unused.
 >
 > I was thinking that probably there isn't a lot of benefit of being able
 to compile your Tor with a different set of ciphers to use and maybe it
 could be best to simply replace ciphers.inc with the FF ciphers.

 That's fine by me.

 > The goal of this is to avoid Tor being distiguishable based on the
 ciphers it advertises, maybe we should just keep our cipher set up to date
 with what is the current mainstream browser.
 >
 > This process of "updating" the cipher suite should be automatized and
 read it from the FF or Chrome source code.

 Sounds good.  We should document (in the code) the process and script we
 use to do that?  Can you do that easily, or should I look into it?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4744#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list