[tor-bugs] #5968 [Tor]: Improve onion key and TLS management
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Apr 10 00:56:57 UTC 2013
#5968: Improve onion key and TLS management
-------------------------+--------------------------------------------------
Reporter: mikeperry | Owner:
Type: enhancement | Status: new
Priority: major | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Keywords: tor-relay | Parent: #5456
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by nickm):
Replying to [comment:10 mikeperry]:
> Aha! You only have 3 guards, and Directory Guards means you now only
need to make exactly that many TLS connections as a client.
>
> This means we could include the TLS hash only in the full descriptor,
and clients could then simply fetch the full descriptor for their guards.
Fetch from whom? If they get the descriptor from the party they assume is
their guard, it could be a fake one signed by the adversary (if the
adversary has compromised the guard's identity key). If they get it
directly from some other party, they will be leaking who their guards are,
*AND* that party could give them a one-off fake one, or an old one, or
whatever. (The defense against getting an old/weird descriptor is
checking its digest against the one listed in the consensus. But the
microdescriptor consensus doesn't list descriptor digests.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5968#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list