FINDING · DEFENSE
Ultrasurf confirmed to the researcher that its protocol has no forward secrecy and uses RC4 without any integrity check (no MAC or HMAC). This means all recorded ciphertext can be retrospectively decrypted once a session key is recovered, and the stream is trivially malleable — both properties confirmed by the UltraReach team during disclosure.
From 2012-appelbaum-technical — Technical analysis of the Ultrasurf proxying software · §8.1, §5.15 · 2012 · The Tor Project
Implications
- Every circumvention protocol must use ephemeral Diffie-Hellman (ECDHE) for key exchange so session compromise does not retroactively expose recorded traffic; forward secrecy is non-negotiable for high-risk users.
- Stream ciphers must be paired with a MAC (HMAC-SHA256, Poly1305, or an AEAD construction) to prevent ciphertext manipulation — unauthenticated RC4 or ChaCha20 streams allow in-path censors to inject or flip bits silently.
Tags
Extracted by claude-sonnet-4-6 — review before relying.