- Jan 23, 2015
-
-
George Kadianakis authored
-
- Dec 31, 2014
-
-
George Kadianakis authored
- Add a ChangeLog entry about this. - Don't catch exceptions of set_defaults(). - Only catch explicit exceptions. - Kill trailing whitespace
-
Colin Teberg authored
Note: I had to adjust the sleep time to .1 from .05 on line 121 in test/tester.py. My machine was taking longer to setup the client and servers during testing (my machine is an older core2duo).
- Dec 28, 2014
-
-
Philipp Winter authored
The server must also cache the HMAC of its own UniformDH messages. Otherwise, an active adversary could replay the server's UniformDH message and evade the replay protection.
-
- Nov 01, 2014
-
-
Yawning Angel authored
If the password argument is missing from the bridge line entirely, `handle_socks_args()` will never get called as the username/password auth will not be negotiated. Correctly detect that this has happened at client handshake time, log a warning and drop the connection. Fixes bug #13587.
-
- Jul 22, 2014
-
-
George Kadianakis authored
- Jul 16, 2014
-
-
George Kadianakis authored
-
George Kadianakis authored
Conflicts: obfsproxy/transports/scramblesuit/scramblesuit.py
-
George Kadianakis authored
Because of technical problems (see #10887:comment:11) it was not so easy to write the actual Bridge line that people were supposed to use. Let's just write the password for now. Conflicts: obfsproxy/transports/scramblesuit/const.py obfsproxy/transports/scramblesuit/state.py Conflicts: obfsproxy/transports/scramblesuit/scramblesuit.py
-
George Kadianakis authored
-
George Kadianakis authored
Conflicts: obfsproxy/test/transports/test_scramblesuit.py
- Jul 15, 2014
-
-
George Kadianakis authored
-
George Kadianakis authored
-
irregulator authored
This argument permits to run obfsproxy in unmanaged mode and pass a file containing the scramblesuit password. That way password won't be visible in process list.
-
George Kadianakis authored
-
George Kadianakis authored
-
Philipp Winter authored
We only want to run the packet morphing algorithm when we really need it -- which is immediately before we send data. Previously, we would morph immediately upon receiving data which is not optimal. This should fix <https://bugs.torproject.org/10991>. Thanks to Yawning Angel who pointed out the problem.
-
Philipp Winter authored
Thanks to Yawning Angel for catching this.
-
Philipp Winter authored
To a user, it's not immediately clear that a given password was not well formed. The refactored error messages should fix that. See bug <https://bugs.torproject.org/11143> for context.
-
George Kadianakis authored
Conflicts: ChangeLog
-
Philipp Winter authored
While the general idea is explained, there are no exact details. Implementations may use different (CS)PRNGs to derive probability distributions. Such "flow diversity" might even be beneficial. Conflicts: doc/scramblesuit/scramblesuit-spec.txt
-
Philipp Winter authored
The first message makes use of the HMAC key which is derived from the master key. It does not use the master key itself.
-
Philipp Winter authored
-
George Kadianakis authored
-
Philipp Winter authored
On occasion, a client's or a server's epoch might already have increased whereas the epoch of the other party didn't. This is a benign event and there is no reason to fail authentication because of this. As a result, as a server, we now also test boundary values, i.e., epoch - 1, epoch, epoch + 1.
-
Philipp Winter authored
That's only relevant for UniformDH.
-
Philipp Winter authored
There's no need for the server to determine its own epoch.
-
George Kadianakis authored
-
Philipp Winter authored
Since we no longer process data after authentication has failed, we might as well increase the closing threshold. The larger interval hopefully makes ScrambleSuit bridges less fingerprintable for active adversaries.
-
Philipp Winter authored
If the client did not authenticate after MAX_HANDSHAKE_LENGTH bytes, authentication has failed. For obfuscation, we keep the connection open a while longer but we stop processing all data from that point on to prevent denial-of-service attacks. (Partial) patch by Yawning Angel. For previous discussion, see: <https://bugs.torproject.org/11092>.
-
Philipp Winter authored
-
Philipp Winter authored
We know in which array slice the mark is expected. As a result, we don't have to look any further than that. Patch by Yawning Angel. See the following ticket for reference: <https://bugs.torproject.org/11092>.
-
Philipp Winter authored
1. Fix a typo by changing "X" to "Y". 2. Add "M_C" and "M_S" to the respective MAC function as they are also authenticated. The problem was pointed out by Yawning Angel in: <https://bugs.torproject.org/10893>
-
Philipp Winter authored
The problem was pointed out by Yawning Angel in: <https://bugs.torproject.org/10893#comment:3>
-
George Kadianakis authored
Conflicts: ChangeLog
-
Philipp Winter authored
Adapt the server's behaviour to the spec change of commit 892846eb. When a server bootstraps for the first time, it randomly generates a byte threshold after which unauthenticated connections are closed. This should fix <https://bugs.torproject.org/11092>.
-
Philipp Winter authored
In particular, discuss strategies which servers should implement if clients cannot authenticate. Otherwise, malicious clients could run computation-based or memory-based denial-of-service attacks. This problem was reported by Yawning Angel. This should fix <https://bugs.torproject.org/11092>.
-