[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Oct 10 12:47:38 UTC 2019


#32026: Using An Alternative To TCP To Avoid Packet Injection?
-------------------------+-------------------------------------------------
 Reporter:               |          Owner:  (none)
  Aphrodites1995         |
     Type:  enhancement  |         Status:  new
 Priority:  Medium       |      Component:  Circumvention/Censorship
                         |  analysis
  Version:               |       Severity:  Normal
 Keywords:               |  Actual Points:
Parent ID:               |         Points:
 Reviewer:               |        Sponsor:
-------------------------+-------------------------------------------------
 According to https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf
 , the GFW only injects packets, mostly TCP RST signals. What if TOR has
 bridges/servers that do not respond to TCP RST? This would render the
 connection interfering part of GFW useless. Here, a connection ends only
 when both sides send a "END" signal to the other side with their private
 key for the connection only that is shared through the connection. We
 don't even need to obfuscate TOR traffic anymore as the packets are not
 blocked. With the DNS inspection, we could have IPs for bridges/servers,
 which do the DNS queries on non censored DNS servers.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list