FINDING · DETECTION

Three independent implementation flaws in obfs4proxy's Elligator encoding made obfs4 public-key representatives passively distinguishable from uniform random bytes: (1) non-canonical square roots allowed a square-then-root test matching 100% of obfs4 outputs but only ~50% of random strings; (2) bit 255 was always zero; (3) only large prime-order subgroup points were encoded. A classifier exploiting these achieves 100% sensitivity (obfs4 never falsely marked as random) at less-than-100% specificity. All three were fixed in obfs4proxy-0.0.12 (December 2021) and 0.0.14 (September 2022).

From 2023-fifield-commentsComments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols · §3 · 2023

Implications

Tags

censors
generic
techniques
fully-encrypted-detecttraffic-shape
defenses
obfs4

Extracted by claude-sonnet-4-6 — review before relying.