[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #22782 [Obfuscation/Snowflake]: Additional domain fronts for Snowflake rendezvous
#22782: Additional domain fronts for Snowflake rendezvous
-----------------------------------+------------------------------
Reporter: cypherpunks | Owner: (none)
Type: enhancement | Status: needs_review
Priority: Medium | Milestone:
Component: Obfuscation/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------+------------------------------
Comment (by joncamfield):
Note that Amazon may also be dropping this support soon:
https://aws.amazon.com/blogs/security/enhanced-domain-protections-for-
amazon-cloudfront-requests/
"
**Enhanced Protection against Domain Fronting**
CloudFront will also be soon be implementing enhanced protections against
so-called “Domain Fronting”. Domain Fronting is when a non-standard client
makes a TLS/SSL connection to a certain name, but then makes a HTTPS
request for an unrelated name. For example, the TLS connection may connect
to “www.example.com” but then issue a request for “www.example.org”.
In certain circumstances this is normal and expected. For example,
browsers can re-use persistent connections for any domain that is listed
in the same SSL Certificate, and these are considered related domains. But
in other cases, tools including malware can use this technique between
completely unrelated domains to evade restrictions and blocks that can be
imposed at the TLS/SSL layer.
To be clear, this technique can’t be used to impersonate domains. The
clients are non-standard and are working around the usual TLS/SSL checks
that ordinary clients impose. But clearly, no customer ever wants to find
that someone else is masquerading as their innocent, ordinary domain.
Although these cases are also already handled as a breach of our AWS Terms
of Service, in the coming weeks we will be checking that the account that
owns the certificate we serve for a particular connection always matches
the account that owns the request we handle on that connection. As ever,
the security of our customers is our top priority, and we will continue to
provide enhanced protection against misconfigurations and abuse from
unrelated parties."
"
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22782#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs