Obfuscated TCP

{{Short description|Obsolete TCP extension}}

Obfuscated TCP (ObsTCP) was a proposal for a transport layer protocol which implements opportunistic encryption over Transmission Control Protocol (TCP). It was designed to prevent mass wiretapping and malicious corruption of TCP traffic on the Internet, with lower implementation cost and complexity than Transport Layer Security (TLS). In August 2008, IETF rejected the proposal for a TCP option, suggesting it be done on the application layer instead.{{Cite web |author=Adam Langley |date=2008-08-15 |title=Sorry folks, I think Obfuscated TCP died |publisher=Obfuscated TCP development blog |url=http://obstcp.blogspot.com/2008/08/sorry-folks-i-think-obfuscated-tcp-died.html }} The project has been inactive since a few months later.

In 2010 June, a separate proposal called tcpcrypt has been submitted, which shares many of the goals of ObsTCP: being transparent to applications, opportunistic and low overhead. It requires even less configuration (no DNS entries or HTTP headers). Unlike ObsTCP, tcpcrypt also provides primitives down to the application to implement authentication and prevent man-in-the-middle attacks (MITM).{{cite conference |author=Andrea Bittau|date=2010-08-13 |title=The case for ubiquitous transport-level encryption |publisher=19th USENIX Security Symposium |url=http://www.usenix.org/events/sec10/tech/full_papers/Bittau.pdf |display-authors=etal}}

Historical origin

ObsTCP was created by Adam Langley. The concept of obfuscating TCP communications using opportunistic encryption evolved through several iterations. The experimental iterations of ObsTCP used TCP options in 'SYN' packets to advertise support for ObsTCP, the server responding with a public key in the 'SYNACK'. An IETF draft protocol was first published in July 2008. Packets were encrypted with Salsa20/8,

{{cite web

|url=http://cr.yp.to/snuffle.html

|title=Snuffle 2005

|publisher=cr.yp.to

|accessdate=2009-05-08

}}

and signed packets with MD5 checksums.

{{cite web

|url=https://tools.ietf.org/html/draft-eddy-tcp-loo-04

|title=Extending the Space Available for TCP Options

|publisher=IETF

|accessdate=2015-02-07

|first1=Wesley

|last1=Eddy

|first2=Adam

|last2=Langley

}}

The present (third) iteration uses special DNS records (or out of band methods) to advertise support and keys, without modifying the operation of the underlying TCP protocol.

{{cite web

|url=http://code.google.com/p/obstcp/wiki/History

|title=Obfuscated TCP History

|publisher=Google

|accessdate=2009-05-08

|archiveurl=https://web.archive.org/web/20090108083734/http://code.google.com/p/obstcp/wiki/History

|archivedate=2009-01-08

|date=Oct 2, 2008

}}

Encryption features

ObsTCP is a low cost protocol intended to protect TCP traffic, without requiring public key certificates, the services of Certificate Authorities, or a complex Public Key Infrastructure. It is intended to suppress the use of undirected surveillance to trawl unencrypted traffic, rather than protect against man in the middle attack.

The software presently supports the Salsa20/8 stream cipher and Curve25519

{{cite web

|url=http://cr.yp.to/ecdh.html

|title=Curve25519: high-speed elliptic-curve cryptography

|publisher=cr.yp.to

|accessdate=2009-05-08

}}

elliptic-curve Diffie Hellman function.

Comparison with TLS/SSL/HTTPS

class="wikitable" border="1"
Feature

! ObsTCP

! SSL/TLS/HTTPS

Public Key Infrastructure

| Does not require a signed public key certificate

| Requires that a signed public key certificate is purchased (or self-signed certificate is used)

Web browser support

| Patched versions of Firefox available

{{cite web

|url=http://code.google.com/p/obstcp/wiki/Firefox

|title=Obfuscated TCP Clients: Firefox

|publisher=Google

|accessdate=2009-05-08

}}

| Widely supported by all popular web browsers

Web server support

| Requires patches/server upgrades for lighttpd and Apache

{{cite web

|url=http://code.google.com/p/obstcp/wiki/WebMastersOBS

|title=Installing ObsTCP using the ObsTCP transport layer

|publisher=Google

|accessdate=2009-05-08

}}

| Widely supported by popular web servers

Network latency

| Nil additional round trips per connection (though DNS lookup may be required to obtain key advertisement)

| One or two additional round trips per connection

Encryption speed

| Very fast cryptography

| Slower

TCP port

| Can use any TCP port

| Typically uses port 443, but can use any TCP port

Security characteristics

| Does not resist some man-in-the-middle attacks

| Resists man-in-the-middle attacks

Connection establishment

A server using ObsTCP advertises a public key and a port number.

A DNS 'A record' may be used to advertise server support for ObsTCP (with a DNS 'CNAME record' providing a 'friendly' name). HTTP header records, or cached/out of band keyset information may also be used instead.

A client connecting to an ObsTCP server parses the DNS entries, uses HTTP header records, or uses cached/out of band data to obtain the public key and port number, before connecting to the server and encrypting traffic.

See also

References

{{reflist|30em}}

{{DEFAULTSORT:Obfuscated Tcp}}

Category:TCP extensions