[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #3291 [Pluggable transport]: obfs2 should wait before closing connection on wrong magic/plength
#3291: obfs2 should wait before closing connection on wrong magic/plength
---------------------------------+------------------------------------------
Reporter: asn | Owner: asn
Type: defect | Status: needs_review
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Keywords: | Parent:
Points: | Actualpoints:
---------------------------------+------------------------------------------
Comment(by asn):
Replying to [comment:5 nickm]:
> The RECV_BAD_WAIT patch makes no sense to me. What is it for? Why
can't we just close the connection?
{{{
<asn> The RECV_BAD_WAIT patch is to implement the spec (check top of
#3291).
<asn> Now, when I first saw that part of the spec I thought "Oh okay, this
is obviously to avoid active-timing attacks where someone sends a random
packet to the obfsproxy and sees
if it kills the connection immediately, then that someone knows that
something is fishy (since it accepted other packets but not his).".
<asn> But now that you questioned that in the ticket, I'm not sure what it
is for.
<asn> Because it obviously doesn't counter an "attack" like the above.
<asn> But why is it written in the spec, then?
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3291#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs