90% of exits vulnerable to TCP off-path attack

[one last time, no DKIM for Tor lists nevermore] RFC-5961 CVE-2016-5696 http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_commu... FYI all

Indeed! Perhaps we can extend the research paper's (the actual paper not that silly article) 4-tuple inference to infer tor connections for a given relay without knowledge of the connecting relay's IP address by extending the permutation space using the current tor relay consensus. On Fri, Aug 12, 2016 at 11:52:55AM -0400, starlight.2016q3@binnacle.cx wrote:
[one last time, no DKIM for Tor lists nevermore]
RFC-5961
CVE-2016-5696
http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_commu...
FYI all
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
participants (2)
-
dawuud
-
starlight.2016q3@binnacle.cx