[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #3291 [Pluggable transport]: obfs2 should wait before closing connection on wrong magic/plength



#3291: obfs2 should wait before closing connection on wrong magic/plength
---------------------------------+------------------------------------------
 Reporter:  asn                  |          Owner:  asn         
     Type:  defect               |         Status:  needs_review
 Priority:  normal               |      Milestone:              
Component:  Pluggable transport  |        Version:              
 Keywords:                       |         Parent:              
   Points:                       |   Actualpoints:              
---------------------------------+------------------------------------------

Comment(by asn):

 Replying to [comment:5 nickm]:
 > The RECV_BAD_WAIT patch makes no sense to me.  What is it for?  Why
 can't we just close the connection?

 {{{
 <asn> The RECV_BAD_WAIT patch is to implement the spec (check top of
 #3291).
 <asn> Now, when I first saw that part of the spec I thought "Oh okay, this
 is obviously to avoid active-timing attacks where someone sends a random
 packet to the obfsproxy and sees
       if it kills the connection immediately, then that someone knows that
 something is fishy (since it accepted other packets but not his).".
 <asn> But now that you questioned that in the ticket, I'm not sure what it
 is for.
 <asn> Because it obviously doesn't counter an "attack" like the above.
 <asn> But why is it written in the spec, then?
 }}}

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3291#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs