[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29430 [Applications/Tor Browser]: Use uTLS for meek TLS camouflage in Tor Browser
#29430: Use uTLS for meek TLS camouflage in Tor Browser
--------------------------------------+--------------------------
Reporter: dcf | Owner: tbb-team
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: meek utls | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by dcf):
Heads up, upstream utls fixed a distinguishability bug recently. A second
ClientHello (which the client sends after the server sends a
HelloRetryRequest) was not being camouflaged correctly. I confirmed that
the bug existed with HelloChrome_70 against ajax.aspnetcdn.com, but I
haven't personally tested yet that the fix actually fixes it. When I do,
I'll update the branch.
https://github.com/refraction-networking/utls/pull/21
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29430#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs