[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26122 [Obfuscation/Censorship analysis]: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec



#26122: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
---------------------------------------------+-------------------------
 Reporter:  cypherpunks                      |          Owner:  dcf
     Type:  defect                           |         Status:  closed
 Priority:  Medium                           |      Milestone:
Component:  Obfuscation/Censorship analysis  |        Version:
 Severity:  Normal                           |     Resolution:  wontfix
 Keywords:                                   |  Actual Points:
Parent ID:                                   |         Points:
 Reviewer:                                   |        Sponsor:
---------------------------------------------+-------------------------
Changes (by yawning):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 It does conform to the spec.

 The interval and threshold is randomized on a per-server instance basis.
 Exactly how this is implemented (and even then there is a difference
 between `SHOULD` and `MUST`) is deliberately left up to the
 implementation, and the altered behavior is also fairly distinctive.

 As a side note: I both recommended starting the development of something
 new, and the migration off obfs4 over a year ago.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26122#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs