[tor-bugs] #29077 [Obfuscation/meek]: uTLS for meek-client camouflage
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Feb 14 18:17:32 UTC 2019
#29077: uTLS for meek-client camouflage
------------------------------+------------------------------
Reporter: dcf | Owner: dcf
Type: enhancement | Status: needs_review
Priority: Medium | Milestone:
Component: Obfuscation/meek | Version:
Severity: Normal | Resolution:
Keywords: moat utls | Actual Points:
Parent ID: | Points:
Reviewer: ahf | Sponsor:
------------------------------+------------------------------
Comment (by dcf):
Replying to [comment:22 cohosh]:
> Hey a did a quick look, here are some comments:
>
> - meek-client now requires go version 1.11 or later because of utls. I
looked but didn't find in the documentation or READMEs the required go
version for building the client. It's possible I missed it, just wanted to
point out the required version update.
Thank you for reviewing.
Yes, it's a bit of a bummer to require such a recent go... I think it's
because uTLS is a copy of the stdlib crypto/tls with changes applied on
top, and the stdlib is not shy about requiring a recent compiler.
Unfortunately uTLS will put us on more of an update and maintenance
treadmill. Not only will we have to keep an eye on uTLS to pick up new
fingerprints, but uTLS will have to stay on top of crypto/tls updates
([https://github.com/refraction-networking/utls/pull/12 like this]).
There's a fair amount of uncertainty yet, I feel.
> {{{
> +// otherwise, create an internal http.Transport. In either case, set
DialTLS on
> +// the created Transport do a function that dials using uTLS As a
special case,
> }}}
> do-->to
> uTLS-->uTLS.
Thanks, fixed these in [https://gitweb.torproject.org/pluggable-
transports/meek.git/commit/?h=utls_3&id=dd26d797b15b8a05262209e07846f7204420e81a
dd26d797b15b8a05262209e07846f7204420e81a].
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29077#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list