[tbb-bugs] #17069 [Applications/Tor Browser]: Use false SNI fields, DNS requests for all outgoing connections to cdn-hosted websites
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue May 23 16:26:21 UTC 2017
#17069: Use false SNI fields, DNS requests for all outgoing connections to cdn-
hosted websites
--------------------------------------+--------------------------
Reporter: elypter | Owner: tbb-team
Type: enhancement | Status: new
Priority: Low | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by dcf):
nickm is right, that elypter's suggestion wouldn't be expensive the way
meek is. It's not related to bridge blocking; rather it's about
surveillance by the exit node.
The idea of having a local database of which web site is on which CDN, and
dynamically fronting through some other site on the same CDN as you
browse, has some academic papers and a prototype implementation.
* https://censorbib.nymity.ch/#Holowczak2015a
* https://censorbib.nymity.ch/#Zolfaghari2016a
* https://github.com/CacheBrowser/cachebrowser
* https://cachebrowser.net/
I don't think this proposal is really related to Tor, but if someone wants
to try it, it might be possible to integrate the
[https://github.com/CacheBrowser/cachebrowser-firefox cachebrowser-
firefox] extension with Tor Browser.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17069#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list