[tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Jan 17 15:34:30 UTC 2012


#4743: obfsproxy: obfs2 server sends handshake message on client connection
------------------------------------+---------------------------------------
    Reporter:  asn                  |       Owner:  asn     
        Type:  defect               |      Status:  reopened
    Priority:  normal               |   Milestone:          
   Component:  Pluggable transport  |     Version:          
  Resolution:                       |    Keywords:          
      Parent:                       |      Points:          
Actualpoints:                       |  
------------------------------------+---------------------------------------
Changes (by asn):

  * status:  closed => reopened
  * resolution:  wontfix =>


Comment:

 Another reason to do this, is that obfs2 with a shared secret and this
 ticket implemented can act as a poor man's bridge password, without us
 changing tor.git at all.

 An attacker who connects to obfs2 and doesn't know the shared secret, will
 get a TCP RST from the server, which is not too unusual in the Internet.
 And if a TCP RST is too sketchy, we can probably also patch it so that the
 server closes the connection gracefully.

 Of course, this is just a silly temporary solution till 189/190/191 (or
 any other bridge password scheme) gets implemented, since it's not a
 really flexible solution and there are still active fingerprints to be
 exploited (like the fact that obfsproxy always reads
 `OBFUSCATE_SEED_LENGTH+8` bytes before deciding whether to accept or reset
 a connection). Still, it seems to me that it would help in real life.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4743#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list