[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #29077 [Obfuscation/meek]: uTLS for meek-client camouflage



#29077: uTLS for meek-client camouflage
------------------------------+------------------------------
 Reporter:  dcf               |          Owner:  dcf
     Type:  enhancement       |         Status:  needs_review
 Priority:  Medium            |      Milestone:
Component:  Obfuscation/meek  |        Version:
 Severity:  Normal            |     Resolution:
 Keywords:  moat utls         |  Actual Points:
Parent ID:                    |         Points:
 Reviewer:                    |        Sponsor:
------------------------------+------------------------------

Comment (by dcf):

 * https://gitweb.torproject.org/pluggable-
 transports/meek.git/log/?h=utls_3&id=21abea57d28abe614887135ab380bfb4355de9fc

 Here's another merge candidate, rebased and cleaned up. It's the same
 utls_2 from comment:12, except for squashed commits, more tests, and fixes
 for two small bugs I found through testing: when the `utls.Config` doesn't
 have a `ServerName` set, take the SNI from the dial address; and if
 someone happens to make an http request using `UTLSRoundTripper`, honor
 the proxy setting on the `UTLSRoundTripper`.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29077#comment:20>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs