[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29077 [Obfuscation/meek]: uTLS for meek-client camouflage
#29077: uTLS for meek-client camouflage
------------------------------+---------------------
Reporter: dcf | Owner: dcf
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Obfuscation/meek | Version:
Severity: Normal | Resolution:
Keywords: moat utls | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
------------------------------+---------------------
Comment (by yawning):
> 100% of the failures used a fingerprint with TLSv1.3, while only 28% of
the successes did. I haven't dug deeper to see what the difference between
the success and failure TLSv1.3 handshakes is.
The kludges inherited from `crypto/tls` only apply when TLS 1.3 is
requested.
* https://github.com/refraction-
networking/utls/blob/master/handshake_client.go#L121
* https://github.com/refraction-
networking/utls/blob/master/handshake_client_tls13.go#L300
* https://github.com/refraction-
networking/utls/blob/master/handshake_client_tls13.go#L215
Making the library support the NIST curves is trivial, and would fix this
problem.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29077#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs