#30716: Improve the obfs4 obfuscation protocol ------------------------------------------------+-------------------------- Reporter: phw | Owner: phw Type: task | Status: assigned Priority: High | Milestone: Component: Circumvention/Obfs4 | Version: Severity: Normal | Resolution: Keywords: sponsor28, anti-censorship-roadmap | Actual Points: Parent ID: | Points: 20 Reviewer: | Sponsor: | Sponsor28-must ------------------------------------------------+--------------------------
Comment (by yawning): The framing could use better cryptography and a more sensible design overall, but there are larger deficiencies in the protocol. > So one desideratum from me is that the protocol should allow either side to send any amount of data at any time, and have it correctly interpreted as padding or meaningful data. Ideally it should even be possible for the server to send data before the client has sent anything. At one point I had thoughts of how I would like to implement something like this, but it's been years since I gave serious thought about this problem. I personally would have felt uneasy about a responder-speaks- first design. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30716#comment:3> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs