[tor-bugs] #7098 [Tor]: Add safe-cookie authentication to Extended ORPort and TransportControlPort

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Oct 12 03:01:17 UTC 2012


#7098: Add safe-cookie authentication to Extended ORPort and TransportControlPort
------------------------+---------------------------------------------------
 Reporter:  asn         |          Owner:                    
     Type:  defect      |         Status:  new               
 Priority:  normal      |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor         |        Version:                    
 Keywords:  tor-bridge  |         Parent:  #4773             
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by rransom):

 Replying to [comment:2 rransom]:
 > If you can use e.g. a 64-byte file with a 32-byte constant header for
 your protocols, you can use something a little simpler and nicer (perhaps
 using the 32-byte secret from the file as the HMAC key, and putting the
 protocol-identifying and ‘client-to-server’-versus-‘server-to-client’
 static string(s) in the HMAC message).

 On actual thought, if you put a header in your cookie file, you can just
 use it as a plain client-to-server password.  You wouldn't have to worry
 about breaking other systems that happen to use 32-byte secret keys, and
 the ‘safe cookie’ protocol doesn't defend against MITMs anyway.

 Someone should figure out and specify what security properties these
 protocols actually need.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7098#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list