[tor-bugs] #9345 [Tor]: enabling only the strongest ciphers in the tor browser to make cryptanalysis harder

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Jul 27 15:21:20 UTC 2013


#9345: enabling only the strongest ciphers in the tor browser to make
cryptanalysis harder
---------------------------------------------+------------------------------
 Reporter:  rainbowanon                      |          Owner:                  
     Type:  enhancement                      |         Status:  new             
 Priority:  critical                         |      Milestone:  Tor: unspecified
Component:  Tor                              |        Version:  Tor: unspecified
 Keywords:  encryption, https, cipher suite  |         Parent:                  
   Points:                                   |   Actualpoints:                  
---------------------------------------------+------------------------------
 I suggest disabling weak ciphers in the Tor Browser and enabling only the
 strongest cipher suites forcing HTTPS websites to use only the strongest
 encryption when communicating via HTTPS with the Tor Browser.
 '''How to do it''':
 1-open the browser
 2-type "about:config"
 3-type "SSL3" in the search box
 4-among the search results are all the cipher suites the browser utilities
 5-double click on the (weak) ciphers you want to disable (like all the
 ones containing "128")
 VOILA!
 Now connect to any HTTPS website (like Facebook) and click the lock icon
 and see the cipher used.
 '''Results and importance''':
 We all know now that weak ciphers are either already broken or are very
 close to being cracked. So using the strongest ciphers will make
 cryptanalysis performed by bad ExitNodes much much harder (if not entirely
 impossible) to result in anything harmful to Tor users.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9345>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list