[tor-bugs] #11093 [Obfsproxy]: obfsproxy should use C implementation of UniformDH
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Mar 1 06:05:55 UTC 2014
#11093: obfsproxy should use C implementation of UniformDH
---------------------------+-----------------
Reporter: asn | Owner: asn
Type: defect | Status: new
Priority: normal | Milestone:
Component: Obfsproxy | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
---------------------------+-----------------
Comment (by yawning):
Just to clarify this a bit, the gmpy (gmpy2) implementations are about as
fast as the OpenSSL code I have (with a slight advantage to the gmpy code
for key generation because I *always* generate 2 public keys to avoid
exposing which one is chosen), but the OpenSSL code I have applies
blinding. I could get a faster implementation but the main gain is that
it's more resistant to timing attacks.
If using OpenSSL is acceptable, then #11050 should be solved as well
(either by switching from PyCrypto to M2crypto, or perhaps by extending
the module I wrote to cover all of the cryptography required for
obfsproxy). The latter approach would also allow better management of key
material since the shared secret/session keys don't ever need to be seen
by the actual python code, so I think it may be better from a paranoia
stand point, but the downside is that someone would need to write the
code.
I do note that ensuring data integrity/secrecy once the transport is known
(at the point people are exploiting these problems) is outside of the
obfs3 threat model, but it still feels sloppy to me.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11093#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list