[tor-bugs] #11092 [Obfsproxy]: scramblesuit should make sure that handshake padding is less than MAX_PADDING_LENGTH
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Sat Mar  1 19:31:22 UTC 2014
    
    
  
#11092: scramblesuit should make sure that handshake padding is less than
MAX_PADDING_LENGTH
---------------------------+-----------------------------
     Reporter:  asn        |      Owner:  asn
         Type:  defect     |     Status:  new
     Priority:  normal     |  Milestone:
    Component:  Obfsproxy  |    Version:
   Resolution:             |   Keywords:  pt-scramblesuit
Actual Points:             |  Parent ID:
       Points:             |
---------------------------+-----------------------------
Comment (by phw):
 The obvious solution would be to simply close the TCP connection if
 authentication did not succeed in `MAX_PADDING_LENGTH + something`.
 However, adversaries could easily determine this limit by sending garbage
 data one byte at a time and check when the server closes the connection.
 We already have the server's unique seed and it should probably be used to
 derive a server-specific limit which is then used to determine when an
 unauthenticated TCP connection should be closed.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11092#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list