[tor-bugs] #7098 [Tor]: Add safe-cookie authentication to Extended ORPort and TransportControlPort
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Fri Oct 12 03:01:17 UTC 2012
#7098: Add safe-cookie authentication to Extended ORPort and TransportControlPort
------------------------+---------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.4.x-final
Component: Tor | Version:
Keywords: tor-bridge | Parent: #4773
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by rransom):
Replying to [comment:2 rransom]:
> If you can use e.g. a 64-byte file with a 32-byte constant header for
your protocols, you can use something a little simpler and nicer (perhaps
using the 32-byte secret from the file as the HMAC key, and putting the
protocol-identifying and ‘client-to-server’-versus-‘server-to-client’
static string(s) in the HMAC message).
On actual thought, if you put a header in your cookie file, you can just
use it as a plain client-to-server password. You wouldn't have to worry
about breaking other systems that happen to use 32-byte secret keys, and
the ‘safe cookie’ protocol doesn't defend against MITMs anyway.
Someone should figure out and specify what security properties these
protocols actually need.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7098#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list