Firefox changed ciphersuits since we last updated ciphers.inc. We need to re-run get_mozilla_ciphers.py on the most recent stable Firefox and openssl, to generate a new ciphers.inc.
We should fix get_mozilla_ciphers if it needs it; the code may have rotted a bit.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Hmmm. It looks like enough changes have been made in the identifiers that openssl uses between 1.0.0 and 1.0.1 and 1.0.2 and master that we should really reconsider for 0.2.8. I get different answers for every openssl version I try.
I've updated the script to work at all.
Trac: Milestone: Tor: 0.2.7.x-final to Tor: 0.2.8.x-final Priority: normal to major
This ticket makes me wish we had a network-team developer focused on the censorship side of things: is fixing our cipher suite the most important thing we could be doing to blend in better with browsing traffic these days? Heck, is matching Firefox's signature the thing we should be doing still, or is some other browser much more popular in key locations this decade?
This is now being used in places in England to block access to Tor. Can confirm Gatwick Airport uses this.
Modifying the header using for example Fiddler on Windows makes Tor network accessible again.
Airport using some DPI, that periodically (several days or weeks) get updates from vendor. You can't to make ciphersuites for Tor and Firefox to match for 100%, they using different libs, smart dpi vendor will use that difference for sure. So this ticket can't help you to bypass censorship in any real timeline.
If you want to play censorship box vs. plain Tor, then you need to make ciphersuites configurable by user, and still to be ready to get specific openssl's fpr.
That was easy enough -- see branch ciphers.inc for the client side.
For the server side, see branch server_ciphers. For that, there are a couple more ciphersuites to consider now. I've restored and re-run gen_server_ciphersuites to take those into account. For now, CCM is ranked below GCM and above CBC-SHA; Chacha is ranked below AES.
Trac: Status: accepted to needs_review Actualpoints: N/Ato .2
I'm uncertain of how useful this actually is, and if we were going to match a browser's ciphersuites, matching chrome's would probably be "better" as it totally crushes firefox in terms of market share. That's probably a topic for a different discussion though.
The client branch looks ok from a "it matches Firefox" point of view, though if it were up to me, I'd move ChaCha around at runtime depending on if hardware AES is available or not.
Does OpenSSL do the right thing client side if TLS < 1.2 is negotiated, and the server picks an AEAD suite (RFC 7251 Sec. 3)?
The server branch likewise looks ok, though my comments regarding ChaCha prioritization also apply here. Nitpick: Update the MANDATORY list to remove the DES suite (Per: #19998 (moved)).