Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Trac
Trac
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Create a new issue
  • Issue Boards

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • Legacy
  • TracTrac
  • Issues
  • #4036

Closed (moved)
Open
Opened Sep 16, 2011 by Roger Dingledine@arma

Tor relays/bridges can detect when they are being filtered by SSL cert

The blocking events from Iran in January 2011 and September 2011, and from Syria in mid/late 2011, share a common theme: the client establishes a TCP connection, sends an ssl client hello, and then goes silent.

In theory Tor relays could track if there's a sudden spike in connections like that from a given country, and report it.

I've put this ticket at 'minor' priority since I think the right plan for us (given all the actual dev tasks we need to do) is to hope that some nice volunteer does it.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Tor: unspecified
Milestone
Tor: unspecified
Assign milestone
Time tracking
None
Due date
None
Reference: legacy/trac#4036