[tor-bugs] #14937 [Tor Browser]: Get meek working in Tor Circuit Display

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Mar 21 21:55:23 UTC 2015


#14937: Get meek working in Tor Circuit Display
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  arthuredelstein
  arthuredelstein        |     Status:  needs_review
         Type:  defect   |  Milestone:
     Priority:  normal   |    Version:
    Component:  Tor      |   Keywords:  tbb-circuit-display, tbb-usability,
  Browser                |  tbb-4.5-alpha, TorBrowserTeam201503R,
   Resolution:           |  GeorgKoppen201503R
Actual Points:           |  Parent ID:
       Points:           |
-------------------------+-------------------------------------------------

Comment (by arthuredelstein):

 Replying to [comment:27 dcf]:
 > Oh, hrm, the Globe fingerprints are hashed fingerprints because they are
 bridge relays.
 >
 > meek-google: !46d4a71197b8fa515a826c6b017c522fe264655b
 > meek-amazon: !4ee0cc769eb4b15a872f742ede27d298a59dcade
 > meek-azure: !a2c13b7dfcab1cbf3a884b6eb99a98067ab6ef44
 >
 > I didn't do anything special to get these, only watched the terminal as
 I connected to them (`tor -f torrc` in the meek-client directory):
 > {{{
 > Mar 21 14:28:18.000 [notice] Learned fingerprint
 46D4A71197B8FA515A826C6B017C522FE264655B for bridge 0.0.2.0:1 (with
 transport 'meek').
 > Mar 21 14:28:16.000 [notice] Learned fingerprint
 4EE0CC769EB4B15A872F742EDE27D298A59DCADE for bridge 0.0.2.0:2 (with
 transport 'meek').
 > Mar 21 14:28:13.000 [notice] Learned fingerprint
 A2C13B7DFCAB1CBF3A884B6EB99A98067AB6EF44 for bridge 0.0.2.0:3 (with
 transport 'meek').
 > }}}
 >
 > Here's the fingerprint hashing algorithm if you want to check that they
 correspond to what was posted earlier.
 > {{{
 > >>> import hashlib
 > >>>
 hashlib.sha1("46D4A71197B8FA515A826C6B017C522FE264655B".decode("hex")).digest().encode("hex")
 > '88f745840f47ce0c6a4fe61d827950b06f9e4534'
 > >>>
 hashlib.sha1("4EE0CC769EB4B15A872F742EDE27D298A59DCADE".decode("hex")).digest().encode("hex")
 > '3fd131b74d9a96190b1ee5d31e91757fada1a4f3'
 > >>>
 hashlib.sha1("A2C13B7DFCAB1CBF3A884B6EB99A98067AB6EF44".decode("hex")).digest().encode("hex")
 > 'aa033eeb61601b2b7312d89b62aaa23dc3ed8a34'
 > }}}

 Thanks, David! That fixes it. Are there a similar set of fingerprints we
 can use for flashproxy?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14937#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list