[tor-bugs] #5282 [Firefox Patch Issues]: Randomize non-pipelined requests to defend against traffic fingerprinting
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Wed Apr 18 19:54:40 UTC 2012
#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------------------+--------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: defect | Status: closed
Priority: major | Milestone: TorBrowserBundle 2.3.x-stable
Component: Firefox Patch Issues | Version:
Resolution: fixed | Keywords: MikePerry201204
Parent: | Points: 4
Actualpoints: 12 |
-------------------------------------+--------------------------------------
Changes (by mikeperry):
* status: needs_review => closed
* points: => 4
* resolution: => fixed
* actualpoints: => 12
Comment:
Ok, this is all set and merged. I had to alter the patch a bit to ensure
request randomization. I also pinged Henze and Panchenko with the updated
version.
I also looked into the SPDY spec briefly. It has the ability to store
arbitrary state in the browser.. We'll want to neuter that, as well as
reduce its insanely long keepalive duration. I have not put deep thought
into how to do request randomization or stream limiting in spdy, though
(or if it is really beneficial anymore in the face of the ultra-efficient
request pipelining).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list