[tor-bugs] #17069 [Applications/Tor Browser]: Use false SNI fields, DNS requests for all outgoing connections to cdn-hosted websites

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 23 16:26:21 UTC 2017


#17069: Use false SNI fields, DNS requests for all outgoing connections to cdn-
hosted websites
--------------------------------------+--------------------------
 Reporter:  elypter                   |          Owner:  tbb-team
     Type:  enhancement               |         Status:  new
 Priority:  Low                       |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+--------------------------

Comment (by dcf):

 nickm is right, that elypter's suggestion wouldn't be expensive the way
 meek is. It's not related to bridge blocking; rather it's about
 surveillance by the exit node.

 The idea of having a local database of which web site is on which CDN, and
 dynamically fronting through some other site on the same CDN as you
 browse, has some academic papers and a prototype implementation.
  * https://censorbib.nymity.ch/#Holowczak2015a
  * https://censorbib.nymity.ch/#Zolfaghari2016a
  * https://github.com/CacheBrowser/cachebrowser
  * https://cachebrowser.net/

 I don't think this proposal is really related to Tor, but if someone wants
 to try it, it might be possible to integrate the
 [https://github.com/CacheBrowser/cachebrowser-firefox cachebrowser-
 firefox] extension with Tor Browser.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17069#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list