[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29077 [Obfuscation/meek]: uTLS for meek-client camouflage
#29077: uTLS for meek-client camouflage
------------------------------+------------------------------
Reporter: dcf | Owner: dcf
Type: enhancement | Status: needs_review
Priority: Medium | Milestone:
Component: Obfuscation/meek | Version:
Severity: Normal | Resolution:
Keywords: moat utls | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
------------------------------+------------------------------
Comment (by dcf):
* https://gitweb.torproject.org/pluggable-
transports/meek.git/log/?h=utls_3&id=21abea57d28abe614887135ab380bfb4355de9fc
Here's another merge candidate, rebased and cleaned up. It's the same
utls_2 from comment:12, except for squashed commits, more tests, and fixes
for two small bugs I found through testing: when the `utls.Config` doesn't
have a `ServerName` set, take the SNI from the dial address; and if
someone happens to make an http request using `UTLSRoundTripper`, honor
the proxy setting on the `UTLSRoundTripper`.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29077#comment:20>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs