[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29627 [Applications/Tor Launcher]: Moat: add support for obfsproxy's meek_lite
#29627: Moat: add support for obfsproxy's meek_lite
---------------------------------------+-----------------------------------
Reporter: mcs | Owner: brade
Type: defect | Status: needs_information
Priority: Medium | Milestone:
Component: Applications/Tor Launcher | Version:
Severity: Normal | Resolution:
Keywords: TorBrowserTeam201905 | Actual Points:
Parent ID: #29430 | Points:
Reviewer: | Sponsor:
---------------------------------------+-----------------------------------
Changes (by mcs):
* status: needs_revision => needs_information
Comment:
Replying to [comment:8 gk]:
> Okay, I gave it another look. Just one final bit: You write
> {{{
> + // If the encoded argument list is less than 255 bytes in
> }}}
> which seems correct to me, but then you do
> {{{
> + if (this.mMeekClientEscapedArgs.length <= 255)
> }}}
> I guess you want `if (this.mMeekClientEscapedArgs.length < 255)`
instead?
That is a good question. We think the code is correct but the spec is
wrong. SOCKS5 supports up to 255 bytes in each auth field. The
obfs4proxy code reads a byte to get the length and does not have any other
limitations, so up to and including 255 is supported. Kathy and I wanted
to maximize the space available for args, so we used <=. Do you think
this is OK? Should we file a bug against the PT spec?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29627#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs