Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #7348

Closed
Open
Created Nov 06, 2012 by Arturo Filasto@art

Discuss strategies for detecting the probes IP address

Currently we detect the client IP by doing a HTTPS request to https://check.torproject.org/ and parsing the content of this page.

This can be a problem since it allows an attacker to fingerprint OONIProbe based on the fact that it does this lookup when a test is run. What other strategies can we use to avoid this?

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking