[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Oct 14 06:09:03 UTC 2019
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-----------------------------------------------+------------------------
Reporter: Aphrodites1995 | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Circumvention/Censorship analysis | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------------+------------------------
Comment (by dcf):
Replying to [comment:4 arma]:
> Replying to [comment:3 dcf]:
> > In China, it's some combination of at least the following techniques:
> > * Running middle nodes and recording the addresses that connect to
them.
>
> Wow, is this one thought to actually be happening? Citation or details?
:)
>
> If so, we could conceivably run some private obfs4 bridges and connect
to public relays in an ordered fashion to figure out which ones are
watching, "bad relays trap" style.
Sorry, it was a mistake to list the middle-node technique under the China
heading. As far as I know, there's no evidence that the GFW does that.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list