Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Tor
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 823
    • Issues 823
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 30
    • Merge requests 30
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Core
  • TorTor
  • Issues
  • #4036
Closed
Open
Created Sep 16, 2011 by Roger Dingledine@armaReporter

Tor relays/bridges can detect when they are being filtered by SSL cert

The blocking events from Iran in January 2011 and September 2011, and from Syria in mid/late 2011, share a common theme: the client establishes a TCP connection, sends an ssl client hello, and then goes silent.

In theory Tor relays could track if there's a sudden spike in connections like that from a given country, and report it.

I've put this ticket at 'minor' priority since I think the right plan for us (given all the actual dev tasks we need to do) is to hope that some nice volunteer does it.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking