[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #26122 [Obfuscation/Censorship analysis]: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec



#26122: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
-------------------------------------------------+-----------------
     Reporter:  cypherpunks                      |      Owner:  dcf
         Type:  defect                           |     Status:  new
     Priority:  Medium                           |  Milestone:
    Component:  Obfuscation/Censorship analysis  |    Version:
     Severity:  Normal                           |   Keywords:
Actual Points:                                   |  Parent ID:
       Points:                                   |   Reviewer:
      Sponsor:                                   |
-------------------------------------------------+-----------------
 obfs4-spec.txt:
 > On the event of a failure at this point implementations SHOULD delay
 dropping the TCP connection from the client by a random interval to make
 active probing more difficult.

 closeAfterDelay() can to violate spec by closing connection immediately.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26122>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs