[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #26122 [Obfuscation/Censorship analysis]: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
#26122: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
-------------------------------------------------+-----------------
Reporter: cypherpunks | Owner: dcf
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Obfuscation/Censorship analysis | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-------------------------------------------------+-----------------
obfs4-spec.txt:
> On the event of a failure at this point implementations SHOULD delay
dropping the TCP connection from the client by a random interval to make
active probing more difficult.
closeAfterDelay() can to violate spec by closing connection immediately.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26122>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs