FINDING · DETECTION
Obfs4's data-transport phase encrypts per-record length fields with an unauthenticated stream cipher. An active adversary can overwrite this field to force a predictable TCP connection termination at a calculable byte offset; the authors experimentally confirmed that Tor-over-Obfs4 connections can be reliably distinguished from other FEPs because client initiation messages have consistent lengths.
From 2023-fenske-security — Security Notions for Fully Encrypted Protocols · §2.3 · 2023 · Free and Open Communications on the Internet
Implications
- Authenticate all framing metadata (length fields, padding indicators) with the same AEAD used for payload — any unauthenticated framing field is an active-distinguisher oracle.
- On AEAD decryption failure, silently discard bytes and hold the connection open indefinitely rather than closing; a predictable closure leaks ciphertext boundary information to active adversaries.
Tags
Extracted by claude-sonnet-4-6 — review before relying.