[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #11092 [Obfsproxy]: scramblesuit should make sure that handshake padding is less than MAX_PADDING_LENGTH



#11092: scramblesuit should make sure that handshake padding is less than
MAX_PADDING_LENGTH
---------------------------+-----------------------------
     Reporter:  asn        |      Owner:  asn
         Type:  defect     |     Status:  new
     Priority:  normal     |  Milestone:
    Component:  Obfsproxy  |    Version:
   Resolution:             |   Keywords:  pt-scramblesuit
Actual Points:             |  Parent ID:
       Points:             |
---------------------------+-----------------------------

Comment (by phw):

 The obvious solution would be to simply close the TCP connection if
 authentication did not succeed in `MAX_PADDING_LENGTH + something`.
 However, adversaries could easily determine this limit by sending garbage
 data one byte at a time and check when the server closes the connection.

 We already have the server's unique seed and it should probably be used to
 derive a server-specific limit which is then used to determine when an
 unauthenticated TCP connection should be closed.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11092#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs