#8169 closed defect (fixed)
replace TCP timestamp
Reported by: | proper | Owned by: | |
---|---|---|---|
Priority: | Medium | Milestone: | |
Component: | Webpages/Website | Version: | |
Severity: | Keywords: | ||
Cc: | proper | Actual Points: | |
Parent ID: | Points: | ||
Reviewer: | Sponsor: |
Description
The JonDonym documentation states, "[...] TCP timestamps can be used for tracking [...]" and "The JonDonym mixes automatically replace your potentially insecure TCP packets by their own.".
Tor should probable do the same or state somewhere why they believe why it's not necessary.
Sorry, if this is a duplicate or elsewhere documented. Search term site:torproject.org TCP timestamp or similar didn't bring results.
Child Tickets
Change History (7)
comment:1 Changed 7 years ago by
comment:2 Changed 7 years ago by
Though, ugh, the faq entries around that on the torfaq have been overrun by idiots. I wonder if I should transfer that particular faq entry over to the 'real' faq.
comment:3 Changed 7 years ago by
Component: | Tor → Website |
---|
arma: I think that could be a clever thing to do
comment:4 Changed 5 years ago by
Resolution: | → fixed |
---|---|
Status: | new → closed |
comment:7 Changed 5 years ago by
(Please reopen with what we still need to do if you feel this wasn't adequate)
If I understand their web page correctly, Tor does this automatically just like the Jondonym mixes do. It's a property you get for free by terminating the underlying traffic flows at each hop rather than packaging up IP packets and sending them across the network.
See e.g. https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#DoesTorresistremotephysicaldevicefingerprinting