[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #29077 [Obfuscation/meek]: uTLS for meek-client camouflage



#29077: uTLS for meek-client camouflage
------------------------------+---------------------
 Reporter:  dcf               |          Owner:  dcf
     Type:  enhancement       |         Status:  new
 Priority:  Medium            |      Milestone:
Component:  Obfuscation/meek  |        Version:
 Severity:  Normal            |     Resolution:
 Keywords:  moat utls         |  Actual Points:
Parent ID:                    |         Points:
 Reviewer:                    |        Sponsor:
------------------------------+---------------------

Comment (by yawning):

 >  100% of the failures used a fingerprint with TLSv1.3, while only 28% of
 the successes did. I haven't dug deeper to see what the difference between
 the success and failure TLSv1.3 handshakes is.

 The kludges inherited from `crypto/tls` only apply when TLS 1.3 is
 requested.

  * https://github.com/refraction-
 networking/utls/blob/master/handshake_client.go#L121
  * https://github.com/refraction-
 networking/utls/blob/master/handshake_client_tls13.go#L300
  * https://github.com/refraction-
 networking/utls/blob/master/handshake_client_tls13.go#L215

 Making the library support the NIST curves is trivial, and would fix this
 problem.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29077#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs