[tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu Oct 11 20:22:03 UTC 2012


#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--------------------------------------+-------------------------------------
 Reporter:  kaepora                   |          Owner:  erinn                        
     Type:  enhancement               |         Status:  new                          
 Priority:  normal                    |      Milestone:  TorBrowserBundle 2.2.x-stable
Component:  Tor bundles/installation  |        Version:  Tor: unspecified             
 Keywords:                            |         Parent:                               
   Points:                            |   Actualpoints:                               
--------------------------------------+-------------------------------------

Comment(by nickm):

 Replying to [comment:6 kaepora]:
 > It appears that none of our primitives are even slightly constant time.
 But in response to this I must ask: How likely is it that timing attacks
 will be a danger in this context?

 Like I explained last night, I think this might be motivated reasoning.

 If you *had* a high-quality side-channel-free implementation of your
 various crypto primitives, you wouldn't be making this argument.  You'd
 just be saying "We have a high-quality implementation of our primitives;
 we don't need to worry about it!"  I think that if you knew how to get a
 high-quality side-channel-free implementation of your various crypto
 operations, you would just switch to it, right?

 > I am inclined to believe it to be unlikely: The ciphertext will be sent
 and received from different browser versions, run on different operating
 systems using different hardware. The risk of precisely consistent timing
 is extremely minimal. Furthermore, the nature of the software design makes
 it difficult for this sort of attack to be relevant. ''Note: If I'm saying
 something wrong here, please correct me; I am not an expert on timing
 attacks! ''

 This is what absolutely everybody says, before they get hit with timing
 side-channels.

 I can't analyze your protocol, because I don't know what the protocol is,
 because of the holes in the documentation. But if there is any case where
 one computer does something in response to another computer doing
 something -- for example, a handshake getting answered with a handshake --
 then you need to be concerned about this.  Even if one browser is not
 vulnerable, another might be.  Even if all the desktop browsers you test
 aren't vulnerable, you would need to analyze low-resource situations, like
 smartphones and whatnot.  Even if you try to exploit and you can't, that
 wouldn't prove that no exploit is possible.

 So: Please care!

 > Per our discussion on IRC, I am going to work up some more documentation
 regarding our protocol and software design, but I am just wondering
 whether timing attacks are worth being a blocking issue here at all. What
 are your thoughts?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7085#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list