[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Oct 11 23:30:56 UTC 2019


#32026: Using An Alternative To TCP To Avoid Packet Injection?
-----------------------------------------------+------------------------
 Reporter:  Aphrodites1995                     |          Owner:  (none)
     Type:  enhancement                        |         Status:  new
 Priority:  Medium                             |      Milestone:
Component:  Circumvention/Censorship analysis  |        Version:
 Severity:  Normal                             |     Resolution:
 Keywords:                                     |  Actual Points:
Parent ID:                                     |         Points:
 Reviewer:                                     |        Sponsor:
-----------------------------------------------+------------------------

Comment (by arma):

 Replying to [comment:3 dcf]:
 > In China, it's some combination of at least the following techniques:
 >  * Running middle nodes and recording the addresses that connect to
 them.

 Wow, is this one thought to actually be happening? Citation or details? :)

 If so, we could conceivably run some private obfs4 bridges and connect to
 public relays in an ordered fashion to figure out which ones are watching,
 "bad relays trap" style.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list