[tor-bugs] #17069 [Applications/Tor Browser]: Use false SNI fields, DNS requests for all outgoing connections to cdn-hosted websites (was: use domain fronting for all outgoing connections to cdn hosted websites)

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 23 12:48:22 UTC 2017


#17069: Use false SNI fields, DNS requests for all outgoing connections to cdn-
hosted websites
--------------------------------------+--------------------------
 Reporter:  elypter                   |          Owner:  tbb-team
     Type:  enhancement               |         Status:  new
 Priority:  Low                       |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+--------------------------
Changes (by nickm):

 * owner:   => tbb-team
 * component:  Core Tor/Tor => Applications/Tor Browser
 * severity:   => Normal
 * milestone:  Tor: very long term =>


Comment:

 Hang on, does this need to be an expense we bear?  What if we only did
 this for cases where we are already connecting to some site on a CDN?
 That is, what if somehow had TorBrowser able to notice that it was going
 to connect to some CDN-hosted domain, and instead of putting that domain
 in the SNI field of the TLS handshake, it used a generic one instead?  If
 that worked, it wouldn't bring any additional cost to Tor.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17069#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list