[Users] [Bug 4177] New: Reduce fingerprinting when using TOR proxy

noreply at thewildbeast.co.uk noreply at thewildbeast.co.uk
Fri Mar 15 14:20:40 CET 2019


https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4177

            Bug ID: 4177
           Summary: Reduce fingerprinting when using TOR proxy
    Classification: Unclassified
           Product: Claws Mail
           Version: GIT
          Hardware: PC
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P3
         Component: Other
          Assignee: users at lists.claws-mail.org
          Reporter: removed-gdpr at example.com

When using TOR proxy it would be good to have additional anonymity enhancing
mechanism reducing the possibility of fingerprinting based on "typical
connections" (e.g. connecting to the same mail servers, RSS feeds etc) through
the same TOR identity.

A little research shows that this is possible. The user has to set a
ControlPort and use HashedControlPassword or CookieAuthentication, then request
a new identity like this:

https://stem.torproject.org/faq.html#how-do-i-request-a-new-identity-from-tor

I have tried the "telnet version" with a short bash script works fine (assuming
localhost and ControlPort 9051):

#!/bin/bash
read -p "Tor controller password: " password

cat <<EOF | nc 127.0.0.1 9051
AUTHENTICATE "${password}"
SIGNAL NEWNYM
quit
EOF

Perhaps a more intelligent approach for implementing similar identity control
functionality in CM would be to use the Stem API
(https://stem.torproject.org/api/control.html). Then CM can use a new TOR
identity/circuit for each separate connection (individual RSS feed, IMAP, POP,
NNTP or other connection). Also it may be possible to use parallel TOR circuits
(https://tor.stackexchange.com/q/12116) which would help not to impose a big
compromise between speed and privacy.

-- 
You are receiving this mail because:
You are the assignee for the bug.



More information about the Users mailing list