[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26122 [Obfuscation/Censorship analysis]: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
#26122: obfs4proxy: closeAfterDelay() should to conform to obfs4 spec
---------------------------------------------+-------------------------
Reporter: cypherpunks | Owner: dcf
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Obfuscation/Censorship analysis | Version:
Severity: Normal | Resolution: wontfix
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------------------------+-------------------------
Changes (by yawning):
* status: new => closed
* resolution: => wontfix
Comment:
It does conform to the spec.
The interval and threshold is randomized on a per-server instance basis.
Exactly how this is implemented (and even then there is a difference
between `SHOULD` and `MUST`) is deliberately left up to the
implementation, and the altered behavior is also fairly distinctive.
As a side note: I both recommended starting the development of something
new, and the migration off obfs4 over a year ago.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26122#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs