[tor-bugs] #9345 [Tor]: enabling only the strongest ciphers in the tor browser to make cryptanalysis harder
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Jul 27 15:21:20 UTC 2013
#9345: enabling only the strongest ciphers in the tor browser to make
cryptanalysis harder
---------------------------------------------+------------------------------
Reporter: rainbowanon | Owner:
Type: enhancement | Status: new
Priority: critical | Milestone: Tor: unspecified
Component: Tor | Version: Tor: unspecified
Keywords: encryption, https, cipher suite | Parent:
Points: | Actualpoints:
---------------------------------------------+------------------------------
I suggest disabling weak ciphers in the Tor Browser and enabling only the
strongest cipher suites forcing HTTPS websites to use only the strongest
encryption when communicating via HTTPS with the Tor Browser.
'''How to do it''':
1-open the browser
2-type "about:config"
3-type "SSL3" in the search box
4-among the search results are all the cipher suites the browser utilities
5-double click on the (weak) ciphers you want to disable (like all the
ones containing "128")
VOILA!
Now connect to any HTTPS website (like Facebook) and click the lock icon
and see the cipher used.
'''Results and importance''':
We all know now that weak ciphers are either already broken or are very
close to being cracked. So using the strongest ciphers will make
cryptanalysis performed by bad ExitNodes much much harder (if not entirely
impossible) to result in anything harmful to Tor users.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9345>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list