[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Oct 10 12:47:38 UTC 2019
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-------------------------+-------------------------------------------------
Reporter: | Owner: (none)
Aphrodites1995 |
Type: enhancement | Status: new
Priority: Medium | Component: Circumvention/Censorship
| analysis
Version: | Severity: Normal
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------+-------------------------------------------------
According to https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf
, the GFW only injects packets, mostly TCP RST signals. What if TOR has
bridges/servers that do not respond to TCP RST? This would render the
connection interfering part of GFW useless. Here, a connection ends only
when both sides send a "END" signal to the other side with their private
key for the connection only that is shared through the connection. We
don't even need to obfuscate TOR traffic anymore as the packets are not
blocked. With the DNS inspection, we could have IPs for bridges/servers,
which do the DNS queries on non censored DNS servers.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list