[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Port for obfsproxy
On 2013-10-07 22:48, Zack Weinberg wrote:
> On Mon, Oct 7, 2013 at 4:36 PM, Jeroen Massar <jeroen@xxxxxxxxx> wrote:
>> On 2013-10-07 16:13, GDR! wrote:
>>> "For example, there MIGHT be a HTTP transport which transforms Tor
>>> traffic to look like regular HTTP traffic."
>>>
>>> I missed the "MIGHT" part. Too bad this doesn't exist.
>>
>> It does: StegoTorus.
>
> Unless something has changed very recently, all publicly available
> copies of StegoTorus are missing critical pieces of functionality
> (such as the ability to use a session key that isn't HARDWIRED INTO
> THE SOURCE CODE),
Indeed, the version you created had this and many other issues, these
have been addressed, but indeed not made publicly available yet, though
Tor Project members have had updates to it already.
As you are very aware unfortunately the people working on the system
have restrictions on code releases, they are doing their best to get it
out in the open though.
> and also don't *really* implement HTTP, only something that
> looks like HTTP on cursory inspection but is trivial
> for an active attacker to detect (see Houmansadr et al.,
> https://www.ieee-security.org/TC/SP2013/papers/4977a065.pdf )
A very well known paper, and a really good one too. The solution to this
is a component called JumpBox, and the initial codename was MockingBird,
I guess you can derive from that what the problem is that it solves:
"How to kill a Mockingbird" :)
> Furthermore, last I looked at it, the "steg module" code (that is, the
> code that actually implements the HTTP-alike) was so riddled with
> security-critical bugs (of the "classic 1990s buffer overflow
> vulnerability" variety) that it was probably unsafe to run it on the
> public Internet *at all*.
And it is good that several other people have been fixing up those
problems before releasing it into the wild of people who depend on
security and anonymity. More code audits are underway and also needed
though before it gets there.
> For these reasons, the copy of ST on my
> personal Github has been modified not to compile out of the box, and I
> am considering deleting it altogether.
That is a good idea, releasing/publishing code of that quality is IMHO
quite irresponsible. It is good that one needs to specifically set it up
on either side though before using it, as that gives an insight to the
quality of the code.
> Jeroen: I am aware that ISC and SRI are supposed to be working on
> fixes for these issues, but until the fixed code is available to the
> general public -- from the official Git repository on
> gitweb.torproject.org -- I request that you refrain from suggesting
> that StegoTorus solves this problem. In fact, I would prefer that you
> not even mention that it exists.
As you state yourself, if the code quality is that bad, why is it
currently up there in that form?
The people who work on that code and are improving the many mistakes
that where in there unfortunately have to go through code review before
releasing things. That does not mean it does not exist or does not
function properly. Code releases are coming, hopefully sooner than later
though.
Getting the code out there under more eyes is something that will happen.
From another reply:
> Oh, and, the cryptographic choices made in the ST paper are, in
> retrospect, quite poor: for instance, I had no idea when I picked it
> that AES-GCM was so troublesome in software, and all of the elliptic
> curve stuff has since been obsoleted by Elligator.
Which just shows that new research improves things and that while
implementing something that one can realize that certain design choices
might not be perfect for the situation originally thought up. Hence, why
one keeps on improving on things to avoid those shortcomings.
> Anyone interested in hacking on steganographic transports nowadays
> would be well-advised to begin from something else, such as Yawning
> Angel's LODP.
While it is a project with a lot of merit, in a lot of locations UDP
will simply not be going in or out of a country...
It is thus a project with quite different goals and resolving a very
different problem, than what StegoTorus is trying to resolve.
And the more of these things the merrier, as it will just increase the
chance of bypassing the filters that are in place.
Greets,
Jeroen
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays