[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #30716 [Circumvention/Obfs4]: Improve the obfs4 obfuscation protocol
#30716: Improve the obfs4 obfuscation protocol
------------------------------------------------+--------------------------
Reporter: phw | Owner: phw
Type: task | Status: assigned
Priority: High | Milestone:
Component: Circumvention/Obfs4 | Version:
Severity: Normal | Resolution:
Keywords: sponsor28, anti-censorship-roadmap | Actual Points:
Parent ID: | Points: 20
Reviewer: | Sponsor:
| Sponsor28-must
------------------------------------------------+--------------------------
Comment (by yawning):
The framing could use better cryptography and a more sensible design
overall, but there are larger deficiencies in the protocol.
> So one desideratum from me is that the protocol should allow either side
to send any amount of data at any time, and have it correctly interpreted
as padding or meaningful data. Ideally it should even be possible for the
server to send data before the client has sent anything.
At one point I had thoughts of how I would like to implement something
like this, but it's been years since I gave serious thought about this
problem. I personally would have felt uneasy about a responder-speaks-
first design.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30716#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs